If you find a security vulnerability in Bitinfrashop, please report it privately:
Email: nodediver@proton.me
Please include:
- Description of the issue
- Steps to reproduce
- Potential impact
Do not create a public GitHub issue for security concerns.
- Change default credentials - Update demo username/password
- Use HTTPS - Always in production
- Secure environment variables - Never commit
.envfiles - Database security - Ensure proper file permissions on
bitinfrashop.db - Regular updates - Keep dependencies updated
This application uses environment variables for sensitive configuration. Copy env.example to .env.local and fill in your actual values:
cp env.example .env.localRequired variables:
BTCPAY_HOST: Your BTCPay Server URLBTCPAY_API_KEY: Your BTCPay Server API key
- PostgreSQL database contains sensitive user data
- Use secure connection strings with proper authentication
- Never commit database credentials or any
.envfiles - Use environment variables for all secrets and API keys
- Implement proper backup and recovery procedures
- β Password Hashing: Implemented with bcrypt
- β Session Management: Secure session-based authentication
- β Input Validation: Comprehensive sanitization and validation
- β Rate Limiting: API endpoint protection
- β Encryption: AES-256-GCM for NWC secrets
- β HTTPS: Required for production deployments
- Using HTTPS in production
- Environment variables properly configured
- PostgreSQL database with secure credentials
- Database backups configured
- NWC encryption key properly set (32-char hex)
- Session secret configured
- Dependencies are up to date
- Rate limiting enabled
- Regular security audits scheduled
Note: Bitinfrashop is production-ready with enterprise-grade security measures including password hashing, input validation, rate limiting, and encryption. For questions or security concerns, contact nodediver@proton.me.