Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported |
|---|---|
| 0.5.x | ✅ |
| < 0.5.0 | ❌ |
We take the security of api-mocker seriously. If you find a vulnerability, please do NOT open an issue. Instead, please follow these steps:
- Do not disclose publicly: Please refrain from discussing the vulnerability in public issues, pull requests, or social media.
- Email us: Send the details of the vulnerability to
security@example.com(replace with actual contact if available). - Provide details: Include a description of the vulnerability, steps to reproduce, and any proof-of-concept code.
We will acknowledge your report within 48 hours and provide an estimated timeline for a fix.
- Always change default secrets: Never run
api-mockerin production with the defaultAPI_MOCKER_SECRET_KEY. Set this environment variable to a strong, random string. - Use strong passwords: The system now enforces password complexity, but ensure users choose strong passwords.
- Enable MFA: Multi-Factor Authentication is supported and recommended for all administrative accounts.
- Use production databases: For production usage, configure a PostgreSQL or MongoDB instance instead of the default SQLite.
- Least Privilege: Ensure the database user used by
api-mockerhas only the necessary permissions.
- Reverse Proxy: Always deploy
api-mockerbehind a reverse proxy (like Nginx or Traefik) that handles SSL termination (https). - Firewall: Restrict access to the API port (default 8000) to trusted sources.
- Pre-0.5.0: Versions prior to 0.5.0 stored passwords in plain text and had potential SQL injection vulnerabilities. Upgrade immediately.