Stop leaking password-reset tokens through email/logging fallbacks #7

Open
opened 2026-03-10 14:40:54 +03:00 by sirily · 0 comments
Owner

Problem
apps/web/src/main.ts constructs reset URLs with live tokens, and packages/providers/src/email.ts logs full outbound email bodies in both the example and fallback transports.

Why this matters
Password-reset tokens become visible in application logs, which is a direct credential-recovery leak.

Acceptance criteria

  • Reset tokens are never written to logs.
  • Provider fallback behavior fails closed or uses a safe debug mode that redacts secrets.
  • Document how password-reset email delivery is safely handled in non-production environments.
Problem `apps/web/src/main.ts` constructs reset URLs with live tokens, and `packages/providers/src/email.ts` logs full outbound email bodies in both the example and fallback transports. Why this matters Password-reset tokens become visible in application logs, which is a direct credential-recovery leak. Acceptance criteria - Reset tokens are never written to logs. - Provider fallback behavior fails closed or uses a safe debug mode that redacts secrets. - Document how password-reset email delivery is safely handled in non-production environments.
Sign in to join this conversation.
No Label
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: sirily/nroxy#7