Stop leaking password-reset tokens through email/logging fallbacks #7
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Problem
apps/web/src/main.tsconstructs reset URLs with live tokens, andpackages/providers/src/email.tslogs full outbound email bodies in both the example and fallback transports.Why this matters
Password-reset tokens become visible in application logs, which is a direct credential-recovery leak.
Acceptance criteria