| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Send an email to security@example.com with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Resolution Timeline: We aim to resolve critical issues within 30 days
- Disclosure: We will coordinate with you on public disclosure timing
When using lambda-env-schema:
- Mark sensitive variables as secrets: Use
secret: truefor API keys, passwords, and tokens - Validate at cold start: Call
createEnv()at module initialization, not in handlers - Use environment-specific schemas: Different validation rules for dev/staging/production
- Review error logs: Ensure no sensitive data leaks through validation errors
This library includes built-in security features:
- Secret Masking: Variables marked with
secret: trueare never logged in error messages - Fail-Fast Validation: Invalid configurations fail immediately at cold start
- Type Safety: TypeScript ensures type-safe access to environment variables
We appreciate responsible disclosure and will acknowledge security researchers who report valid vulnerabilities.