CRITICAL: This application uses sensitive environment variables that must be kept secure:
GITHUB_TOKEN- GitHub personal access token with repo accessGITHUB_CLIENT_SECRET- OAuth application client secretJWT_SECRET- Secret for signing JWT tokensSESSION_SECRET- Secret for Express sessionsADMIN_PASSWORD- Admin account password- AWS credentials (production only)
- Never commit secrets to version control
- Use strong, randomly generated secrets
- Generate JWT/Session secrets:
openssl rand -hex 32
- Generate JWT/Session secrets:
- Rotate secrets regularly
- Use environment-specific
.envfiles - Validate all environment variables on startup
If you discover a security vulnerability, please report it by emailing [security contact] rather than creating a public issue.
- Rate limiting on all endpoints
- Input validation and sanitization
- Helmet.js security headers
- MongoDB query sanitization
- Environment-based error handling (no stack traces in production)
- Structured logging without sensitive data exposure