| Version | Supported |
|---|---|
| 1.x.x | Yes |
If you discover a security vulnerability in cardano402, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
- Create a GitHub security advisory (preferred)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 5 business days
- Fix timeline: Depends on severity
We follow coordinated disclosure:
- Confirm the vulnerability
- Develop and test a fix
- Release the fix
- Credit the reporter (unless they prefer anonymity)
- Publicly disclose after the fix is available
This policy covers the cardano402 repository and its published npm packages.
- Blockfrost API keys are never logged or exposed in error responses
- All inputs validated with Zod schemas
- Rate limiting on all public endpoints (configurable per-route)
- Request body size limits (50KB default, 10MB for uploads)
- Production Docker image runs as non-root user
- Redis authentication supported and recommended for production
- Transaction deduplication prevents double-settlement (SHA-256 + Redis SET NX)
- 10-step verification pipeline catches malformed, expired, and invalid transactions