| Version | Supported |
|---|---|
| 1.x | ✅ |
If you discover a security vulnerability in Xavier, please report it responsibly:
- Do NOT open a public issue
- Email security concerns to the maintainers privately
- Provide detailed information about the vulnerability
- Allow reasonable time for a fix before public disclosure
Xavier is designed with security in mind:
- Authorization and Cookie headers are excluded by default
- Request/response bodies are not logged by default
- Sensitive data must be explicitly allowed
- Stack traces and exception details are hidden in production
- Only generic error messages are returned to clients
- Enable
IncludeExceptionDetailsonly in development
- OpenAPI endpoints are exposed only in Development by default
- Enable
ExposeInProductionexplicitly if needed - Consider authentication for OpenAPI endpoints in production
- Enable rate limiting to prevent abuse
- Configure appropriate limits for your use case
- Always use HTTPS in production
- Review logged data for PII compliance
- Configure appropriate rate limits
- Keep Xavier and dependencies updated