The UPI Payment Gateway team takes security vulnerabilities seriously. If you discover a security vulnerability, please do not create a public GitHub issue. Instead, please report it responsibly.
- Email: Send a detailed report to the maintainers (you can find contact info in the repository)
- Include:
- Description of the vulnerability
- Affected versions
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if you have one)
- 24 hours: Initial acknowledgment of your report
- 7 days: Assessment and confirmation of vulnerability
- 30 days: Fix deployed and security advisory published
- We will acknowledge receipt of your report
- We will not publicly disclose the vulnerability until a fix is available
- We will credit you in the security advisory (if you wish)
- We will keep you updated on the progress
When using UPI Payment Gateway in production:
- Never commit
.envfiles or secrets to version control - Use strong, unique secrets for all API keys
- Rotate secrets regularly
- Restrict Firestore rules to authenticated users only
- Regularly audit Firebase security rules
- Enable Firebase Authentication features appropriate for your use case
- Validate all payment inputs server-side
- Never store sensitive payment information in plain text
- Use HTTPS/TLS for all communications
- Keep dependencies up to date
- Run
npm auditregularly to check for vulnerabilities - Monitor security advisories
- Use environment-specific configurations
- Enable CORS restrictions appropriately
- Implement rate limiting on payment endpoints
- Add logging and monitoring for suspicious activity
| Version | Supported |
|---|---|
| 1.x | ✅ |
| 0.x | ❌ |
Only the latest major version receives security updates.
Security updates will be released as soon as a vulnerability is confirmed and fixed. Updates are released through:
- npm package updates
- GitHub releases
- Security advisories
We appreciate your responsible disclosure and help in making this project more secure!