If a security vulnerability is discovered in prisma-extension-redis
, please report it responsibly. Your assistance in keeping this project secure is greatly appreciated.
To report a vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly until it has been addressed.
- Email the maintainer at mail.yxx4c+security@gmail.com with the following information:
- A description of the vulnerability
- Steps to reproduce the issue
- Any relevant code snippets or configurations
Reports will be acknowledged as soon as possible, typically within a few days, depending on the complexity of the issue.
The latest version of prisma-extension-redis
is currently supported. Users are encouraged to use the most recent version to benefit from any security updates.
To enhance the security of applications using prisma-extension-redis
, consider the following best practices:
- Keep Dependencies Updated: Regularly check for updates to
prisma-extension-redis
and its dependencies. - Use Environment Variables: Store sensitive information, such as Redis connection strings and credentials, in environment variables instead of hardcoding them in the application.
- Limit Redis Access: Configure the Redis instance to allow access only from trusted sources.
- Monitor Logs: Regularly review application logs for any unusual activity.
- OWASP Top Ten - A list of the top ten security risks for web applications.
- Redis Security - Best practices for securing Redis instances.
Thank you for helping to keep prisma-extension-redis
secure!