| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue
- Email the maintainer or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
StockFlow implements the following security measures:
- JWT-based authentication with configurable expiration
- Password hashing using bcryptjs with salt rounds
- Role-based access control (Admin, Manager, Staff)
- Input validation on all endpoints using express-validator
- MongoDB injection prevention via Mongoose
- CORS configuration for allowed origins
- Request body size limits
- Passwords never returned in API responses
- Sensitive config via environment variables
- No credentials stored in version control
- Use HTTPS in production
- Set strong JWT_SECRET (min 32 characters)
- Configure proper CORS origins
- Enable rate limiting
- Regular dependency updates
- Set NODE_ENV=production