We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security Advisories page
- Click "New draft security advisory"
- Fill in the details of the vulnerability
-
Email
- Send an email to [email protected] (replace with actual email)
- Include "SECURITY" in the subject line
Please include the following information in your report:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass)
- Affected component(s) (module name, file path, endpoint)
- Steps to reproduce the vulnerability
- Proof of concept (if applicable)
- Potential impact of the vulnerability
- Suggested remediation (if any)
- Acknowledgment: We will acknowledge your report within 48 hours
- Assessment: We will assess the vulnerability and determine its severity within 7 days
- Updates: We will keep you informed of our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Credit: We will credit you for the discovery (unless you prefer to remain anonymous)
- We follow a 90-day disclosure timeline
- We will coordinate with you on the public disclosure
- We will credit researchers who report vulnerabilities (with permission)
When deploying this system, please ensure:
- Change all default credentials
- Use strong, unique passwords for database access
- Enable SSL/TLS for all communications
- Restrict database access to application servers only
- Use environment variables for sensitive configuration
- Store API keys and secrets securely (use secret management)
- Rotate credentials regularly
- Enable webhook signature verification
- Implement IP whitelisting for webhook endpoints
- Enable encryption at rest
- Enable encryption in transit
- Implement proper backup procedures
- Apply principle of least privilege for DB users
- Deploy behind a WAF (Web Application Firewall)
- Implement rate limiting
- Use private subnets for internal services
- Enable audit logging
- Enable application security logging
- Set up alerts for suspicious activities
- Monitor for unusual payment patterns
- Regularly review access logs
This system includes the following security features:
- Input Validation: All API inputs are validated using Bean Validation
- SQL Injection Prevention: Parameterized queries via JPA/Hibernate
- Idempotency: Prevents duplicate transaction processing
- Audit Logging: All API calls to payment gateways are logged
- Encrypted Credentials: Gateway connection settings stored encrypted
- Spring Security for authentication/authorization
- OAuth 2.0 / JWT for API authentication
- Rate limiting middleware
- WAF protection
This system is designed to support compliance with:
- PCI-DSS: Payment Card Industry Data Security Standard
- GDPR: General Data Protection Regulation (data handling)
- SOC 2: Service Organization Control 2
Note: Compliance requires proper deployment configuration and operational procedures beyond the application code.
Security updates are released as:
- Patch releases for non-breaking security fixes
- Minor releases for security improvements requiring migration
Subscribe to our releases to stay informed about security updates.