Skip to content

Conversation

rusiqe
Copy link

@rusiqe rusiqe commented Aug 8, 2025

This PR addresses findings from a source-level security audit aligned with BugBounty.md.

Summary

  • Remove committed demo private key and replace with a non-functional placeholder; add templates/ssl_cert/.gitignore and README to prevent future leaks.
  • Sanitize workflow/.env.example: replace real-looking secrets with placeholders and warnings; clarify UNSANDBOXED is dev-only.
  • Add workflow/.env.production.example with SANDBOXED defaults and secret-manager placeholders.
  • Add .gitleaks.toml and GitHub Actions workflow to scan for secrets on every PR and push.
  • Add .github/SECURITY.md with Safe Harbor and private reporting guidance.

Recommended follow-ups (not included here)

  • Purge the previous private key from git history using git filter-repo or BFG.
  • Rotate any credentials that may have been reused from the old .env.example.
  • Review PLATFORM-scope routes and webhook signature enforcement for strictness.

Please review.

rusiqe added 2 commits August 8, 2025 12:01
…nd replace committed private key with placeholder

- Replace real-looking secrets in workflow/.env.example with placeholders and warnings
- Add .github/SECURITY.md with Safe Harbor and private reporting guidance
- Add templates/ssl_cert/.gitignore and README; replace demo key with placeholder
- Aligns with BugBounty.md guidance on responsible disclosure and secret handling
…ample

- Add .gitleaks.toml and GitHub Actions workflow to scan secrets on PR/push
- Add workflow/.env.production.example with SANDBOXED defaults and secret-manager placeholders
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant