-
Notifications
You must be signed in to change notification settings - Fork 119
Open
Labels
Review QueuedWaiting for the Dataverse's Maintainer to review this issue.Waiting for the Dataverse's Maintainer to review this issue.
Description
Problem Statement
The current implementation has several security vulnerabilities:
Weak Password Encryption: Uses basic character manipulation instead of proper cryptographic hashing
Hardcoded Database Credentials: Database configuration is stored directly in source code
SQL Injection Vulnerability: Direct string formatting in SQL queries
No Session Management: Missing secure session handling
Proposed Solution
✅ Tasks to Complete
[ ] Replace custom encryption with proper password hashing
- Implement bcrypt or argon2 for password hashing
- Add salt generation for each password
- Update login verification logic
[ ] Implement environment variables for database configuration
- Create .env file support
- Move all sensitive config to environment variables
- Add .env.example template
[ ] Add input validation and SQL injection prevention
- Replace string formatting with parameterized queries
- Add input sanitization functions
- Implement data validation schemas
[ ] Implement secure session management
- Add session tokens for logged-in users
- Implement session timeout
- Add secure logout functionality
Please assign me @multiverseweb
Metadata
Metadata
Assignees
Labels
Review QueuedWaiting for the Dataverse's Maintainer to review this issue.Waiting for the Dataverse's Maintainer to review this issue.