| Version | Supported |
|---|---|
| latest | Yes |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include a description of the vulnerability, steps to reproduce, and potential impact
- Allow reasonable time for a fix before public disclosure
This application implements:
- JWT authentication with short-lived access tokens (15 min)
- Refresh tokens stored in httpOnly, Secure, SameSite=Strict cookies
- Rate limiting on authentication and PDF generation endpoints
- Security headers (CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy)
- CORS with explicit origin allowlisting (fail-closed in production)
- HTTPS enforcement with HSTS
- Input validation on all API endpoints
- Parameterized database queries via Entity Framework Core
- Audit logging for sensitive operations
- Use a strong, unique JWT secret key (32+ characters)
- Configure
AllowedOriginswith your specific domain(s) - Configure
AllowedHostswith your specific domain - Use HTTPS in production
- Keep dependencies up to date
- Review the
deploy/.env.examplefor all required configuration