-
Notifications
You must be signed in to change notification settings - Fork 0
Security
Nick edited this page Nov 26, 2025
·
2 revisions
If you discover a security vulnerability, report it directly through established communication channels.
- API Keys: Required for all endpoints
- Key Rotation: Supported
- Key Scope: Per-tenant namespaces
- Default: 10 requests/second per API key
- Configurable: Per-tenant limits
- Protection: Prevents abuse and DoS
- Burst Detection: Flags suspicious patterns
- URL Limits: Max 5 URLs per request
- Phone Limits: Max 3 phone numbers per request
- Threshold: 10 violations per minute triggers blocking
- Max Length: 8192 characters
- Encoding: UTF-8 only
- Sanitization: XSS prevention in logs
- Log Redaction: Email, phone, credit card numbers masked
- Data Retention: 24 hours (configurable)
- Export: No PII in exports (see PRIVACY.md)
- HTTPS: Required for all API calls
- TLS: Minimum 1.2
- CORS: Configurable per origin
- Docker: Multi-stage builds, minimal attack surface
- Dependencies: Regular security updates
- Secrets: Environment variables, never in code
- CORS Configuration: Environment-based origins (deny-all default in production)
- API Key Validation: Fail-fast on missing keys in production
- Safe Error Messages: Hide internal details in production
-
Database SSL: Auto-enforce
sslmode=requirefor PostgreSQL - Redis Rate Limiting: Distributed rate limiting for multi-instance
- Request Size Limits: Prevent DoS via large requests
- IP Whitelisting: Optional IP-based access control
- No DDoS Protection: Relying on infrastructure-level protection
- No WAF Cloud: Basic application-level WAF only
- No Advanced Threat Detection: Planned for v3.0
- ✅ IP Whitelisting: Available in v2.0
- ✅ Audit Logging: Available in v1.2+
- ✅ PII Redaction: Available in STRICT mode
- ✅ JSON Structured Logging: Available in production
- Rotate Keys: Every 90 days
- Use HTTPS: Always
- Validate Input: Client-side validation
- Monitor Usage: Check stats endpoint regularly
-
Dependencies: Run
poetry auditregularly -
Secrets: Never commit
.envfiles - Updates: Keep dependencies updated
- Testing: Run security tests before deploy
- GDPR: Data retention configurable (default 24h)
- CCPA: User data deletion supported
- SOC 2: Not certified (planned for v2.0)
- Current: None
- Planned: SOC 2 Type II (v2.0)
- Detection: Automated monitoring + manual reports
- Assessment: Severity classification
- Containment: Immediate mitigation
- Remediation: Fix deployment
- Communication: Affected users notified
- Post-Mortem: Lessons learned document
- 2025-11-04: Initial security policy published