Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Security: beginwebdev2002/best-practise

Security

.github/SECURITY.md

description Vibe coding guidelines and architectural constraints for NestJS within the Documentation domain.
tags
nestjs
documentation
best-practices
architecture
topic NestJS
complexity Architect
last_evolution 2026-03-29
vibe_coding_ready true
technology NestJS
domain Documentation
level Senior/Architect
version Latest
ai_role Senior NestJS Expert
last_updated 2026-03-29

πŸ‡ΊπŸ‡Έ English | πŸ‡·πŸ‡Ί Русский

Probot Logo

πŸ›‘οΈ Security Policy

Security: Active Vibe-Coding Protected

Welcome to the official security policy for the best-practise project. Our goal is to ensure the maximum security and reliability of meta-instructions (Vibe Coding) for AI agents (Cursor, Windsurf, Copilot, Antigravity, Aider).

Since this repository serves as an "AI Knowledge Base," our security model differs from traditional software development projects.

πŸ“… Supported Versions

We actively support and update only the latest major versions of our architectural and technological rules.

Version / Branch Security Support Support Status
main (Current) βœ… Supported
v1.x ❌ Unsupported
Legacy Branches / PRs ❌ Unsupported

🚨 Reporting a Vulnerability

Please DO NOT create public issues if you discover a critical vulnerability or potentially dangerous AI instructions in the repository (e.g., instructions that open backdoors via agents).

Secure Reporting Process:

  1. Navigate to the Security Advisories tab or contact the maintainers directly.
  2. Describe the issue in detail: specify the exact .md file containing the vulnerability.
  3. Explain how an AI agent might incorrectly or destructively interpret the instruction.
  4. Attach a Proof of Concept (PoC prompt) if possible, demonstrating the exploitation of the "flawed" rule in Cursor or Windsurf.

We are committed to acknowledging your report within 48 hours and providing a remediation plan.

πŸ€– AI Security Context

This project focuses on Context Injection. Therefore, we classify threats specifically for LLMs and agentic IDEs:

  • Prompt Injections: Hidden or "poisonous" instructions in rule files that force the agent to write malicious code or ignore other project security policies.
  • Insecure Architectural Patterns: Instructions recommending the use of vulnerable dependencies, disabling CORS in production-ready examples, or exposing APIs without proper authentication.
  • Data Leaks: Code examples or AI configuration rules that encourage agents (or developers) to leave API keys and tokens in the codebase.

Severity Levels

Severity Incident Description within Vibe Coding Priority
πŸ”΄ Critical Malicious injections guaranteed to lead to code compromise or RCE executed by the agent. P0
🟠 High Recommendations grossly violating basic security principles (e.g., eval, unvalidated innerHTML in Frontend rules). P1
🟑 Medium Instructions leading to the creation of logical bugs (Bad Smells, Race conditions) in the agent-generated code. P2
🟒 Low Typos in linters, broken or outdated minor style rules. P3

πŸ”„ Incident Response Lifecycle

Below is a visual flowchart of our standard process for handling discovered threats in meta-instructions:

graph TD
    A(["User finds dangerous rule"]) --> B{"Is it critical?"}
    B -->|"Yes (P0, P1)"| C["Submit private Security Advisory"]
    B -->|"No (P2, P3)"| D["Open standard Issue / Pull Request"]
    
    C --> E["Threat analysis by maintainers"]
    E --> F["Vulnerability isolation, disable rule"]
    F --> G["Patch MD file and update instructions"]
    G --> H["Publish Security Release & Notify"]
    H --> I(["Vulnerability resolved"])
    
    D --> G
    
    classDef critical fill:#ffebeb,stroke:#ff0000,stroke-width:2px;
    classDef safe fill:#ebffeb,stroke:#00aa00,stroke-width:2px;
    class C critical;
    class D safe;
    %% Added Design Token Styles for Mermaid Diagrams
    classDef default fill:#e1f5fe,stroke:#03a9f4,stroke-width:2px,color:#000;
    classDef component fill:#e8f5e9,stroke:#4caf50,stroke-width:2px,color:#000;
    classDef layout fill:#f3e5f5,stroke:#9c27b0,stroke-width:2px,color:#000;

    class E component;
    class F component;
    class G component;
    class H component;
    class I component;
    class B component;

Loading

πŸ›‘οΈ Best Practices for Contributors

If you propose new instructions or architectural standards (via PR), strictly adhere to the security rules:

  • No Binary Files: Never add executable scripts if their code cannot be verified directly.
  • Security Annotations: Any code examples for authentication or configuration must be accompanied by // SECURE: comments or explanations of why this approach is standard and secure.
  • Path Restrictions: Absolute paths and hardcoded test secrets are strictly forbidden in rules (e.g., inside backend/nestjs/security.md). Always use placeholders like <YOUR_SECRET_KEY>.

Thank you for contributing to the security and quality of AI-driven development (Vibe Coding)! πŸš€
---
Probot Logo

πŸ›‘οΈ Security Policy

Security: Active Vibe-Coding Protected

Π”ΠΎΠ±Ρ€ΠΎ ΠΏΠΎΠΆΠ°Π»ΠΎΠ²Π°Ρ‚ΡŒ Π² ΠΎΡ„ΠΈΡ†ΠΈΠ°Π»ΡŒΠ½ΡƒΡŽ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΡƒ бСзопасности рСпозитория best-practise. Наша Π·Π°Π΄Π°Ρ‡Π° β€” Π³Π°Ρ€Π°Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½ΡƒΡŽ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ ΠΈ ΡΡ‚Π°Π±ΠΈΠ»ΡŒΠ½ΠΎΡΡ‚ΡŒ ΠΌΠ΅Ρ‚Π°-инструкций (Vibe Coding) для ИИ-Π°Π³Π΅Π½Ρ‚ΠΎΠ² (Cursor, Windsurf, Copilot, Antigravity, Aider).

ΠŸΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ Π΄Π°Π½Π½Ρ‹ΠΉ Ρ€Π΅ΠΏΠΎΠ·ΠΈΡ‚ΠΎΡ€ΠΈΠΉ выступаСт Β«Π‘Π°Π·ΠΎΠΉ Π·Π½Π°Π½ΠΈΠΉ ИИ» (AI Knowledge Base), наша модСль бСзопасности ΠΈΠΌΠ΅Π΅Ρ‚ сущСствСнныС отличия ΠΎΡ‚ классичСских ΠΏΡ€ΠΎΠ΅ΠΊΡ‚ΠΎΠ² Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ³ΠΎ обСспСчСния.

πŸ“… Supported Versions

ΠœΡ‹ осущСствляСм ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΊΡƒ ΠΈ Π°ΠΏΠ΄Π΅ΠΉΡ‚ ΠΈΡΠΊΠ»ΡŽΡ‡ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ послСдних ΠΌΠ°ΠΆΠΎΡ€Π½Ρ‹Ρ… вСрсий Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π½Ρ‹Ρ… ΠΈ тСхнологичСских стандартов.

Version / Branch Security Support Support Status
main (Current) βœ… ΠŸΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΈΠ²Π°Π΅Ρ‚ΡΡ
v1.x ❌ НС поддСрТиваСтся
Legacy Branches / PRs ❌ НС поддСрТиваСтся

🚨 Reporting a Vulnerability

Π—ΠΠŸΠ Π•Π©ΠΠ•Π’Π‘Π― ΡΠΎΠ·Π΄Π°Π²Π°Ρ‚ΡŒ ΠΏΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹Π΅ Issue ΠΏΡ€ΠΈ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠΈ критичСской уязвимости ΠΈΠ»ΠΈ дСструктивных инструкций для ИИ (Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, инструкций, ΠΏΡ€ΠΎΠ²ΠΎΡ†ΠΈΡ€ΡƒΡŽΡ‰ΠΈΡ… Π²Π½Π΅Π΄Ρ€Π΅Π½ΠΈΠ΅ бэкдоров силами Π°Π³Π΅Π½Ρ‚ΠΎΠ²).

ΠŸΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» бСзопасного Ρ€Π΅ΠΏΠΎΡ€Ρ‚ΠΈΠ½Π³Π°:

  1. ΠŸΠ΅Ρ€Π΅ΠΉΠ΄ΠΈΡ‚Π΅ Π² Ρ€Π°Π·Π΄Π΅Π» Security Advisories ΠΈΠ»ΠΈ ΡΠ²ΡΠΆΠΈΡ‚Π΅ΡΡŒ с ΠΌΠ΅ΠΉΠ½Ρ‚Π΅ΠΉΠ½Π΅Ρ€Π°ΠΌΠΈ Π½Π°ΠΏΡ€ΡΠΌΡƒΡŽ.
  2. ΠŸΠΎΠ΄Ρ€ΠΎΠ±Π½ΠΎ Π·Π°Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΈΡ€ΡƒΠΉΡ‚Π΅ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡƒ: ΡƒΠΊΠ°ΠΆΠΈΡ‚Π΅ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹ΠΉ .md Ρ„Π°ΠΉΠ», содСрТащий уязвимый ΠΏΠ°Ρ‚Ρ‚Π΅Ρ€Π½.
  3. ΠžΠΏΠΈΡˆΠΈΡ‚Π΅ Π²Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎΡ‚Π΅Π½Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ Π½Π΅ΠΊΠΎΡ€Ρ€Π΅ΠΊΡ‚Π½ΠΎΠΉ ΠΈΠ»ΠΈ дСструктивной ΠΈΠ½Ρ‚Π΅Ρ€ΠΏΡ€Π΅Ρ‚Π°Ρ†ΠΈΠΈ инструкции ИИ-Π°Π³Π΅Π½Ρ‚ΠΎΠΌ.
  4. ΠŸΡ€Π΅Π΄ΠΎΡΡ‚Π°Π²ΡŒΡ‚Π΅ Proof of Concept (PoC prompt), Π΄Π΅ΠΌΠΎΠ½ΡΡ‚Ρ€ΠΈΡ€ΡƒΡŽΡ‰ΠΈΠΉ ΡΠΊΡΠΏΠ»ΡƒΠ°Ρ‚Π°Ρ†ΠΈΡŽ Π΄Π΅Ρ„Π΅ΠΊΡ‚Π½ΠΎΠ³ΠΎ ΠΏΡ€Π°Π²ΠΈΠ»Π° Π² Cursor ΠΈΠ»ΠΈ Windsurf.

ΠœΡ‹ обязуСмся ΠΏΠΎΠ΄Ρ‚Π²Π΅Ρ€Π΄ΠΈΡ‚ΡŒ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½ΠΈΠ΅ Ρ€Π΅ΠΏΠΎΡ€Ρ‚Π° Π² Ρ‚Π΅Ρ‡Π΅Π½ΠΈΠ΅ 48 часов с прСдоставлСниСм ΠΏΠ»Π°Π½Π° ΠΌΠΈΡ‚ΠΈΠ³Π°Ρ†ΠΈΠΈ.

πŸ€– AI Security Context

Π―Π΄Ρ€ΠΎΠΌ ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π° являСтся AI Context Injection. Π’ связи с этим классификация ΡƒΠ³Ρ€ΠΎΠ· Π°Π΄Π°ΠΏΡ‚ΠΈΡ€ΠΎΠ²Π°Π½Π° ΠΏΠΎΠ΄ спСцифику LLM ΠΈ Π°Π³Π΅Π½Ρ‚Π½Ρ‹Ρ… IDE:

  • Prompt Injections: Π‘ΠΊΡ€Ρ‹Ρ‚Ρ‹Π΅ ΠΈΠ»ΠΈ Β«ΠΎΡ‚Ρ€Π°Π²Π»Π΅Π½Π½Ρ‹Π΅Β» инструкции Π² Ρ„Π°ΠΉΠ»Π°Ρ… ΠΏΡ€Π°Π²ΠΈΠ», ΠΈΠ½ΠΈΡ†ΠΈΠΈΡ€ΡƒΡŽΡ‰ΠΈΠ΅ Π³Π΅Π½Π΅Ρ€Π°Ρ†ΠΈΡŽ врСдоносного ΠΊΠΎΠ΄Π° ΠΈΠ»ΠΈ ΠΎΠ±Ρ…ΠΎΠ΄ Π΄Ρ€ΡƒΠ³ΠΈΡ… ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊ бСзопасности ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π°.
  • Insecure Architectural Patterns: Π˜Π½ΡΡ‚Ρ€ΡƒΠΊΡ†ΠΈΠΈ, Π»Π΅Π³ΠΈΡ‚ΠΈΠΌΠΈΠ·ΠΈΡ€ΡƒΡŽΡ‰ΠΈΠ΅ использованиС уязвимых зависимостСй, ΠΎΡ‚ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ CORS Π² production-ready ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π°Ρ… ΠΈΠ»ΠΈ ΠΏΡƒΠ±Π»ΠΈΠΊΠ°Ρ†ΠΈΡŽ API Π±Π΅Π· Π½Π°Π΄Π»Π΅ΠΆΠ°Ρ‰Π΅ΠΉ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ.
  • Data Leaks: ΠŸΡ€ΠΈΠΌΠ΅Ρ€Ρ‹ ΠΊΠΎΠ΄Π° ΠΈΠ»ΠΈ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΈ ИИ, ΠΏΡ€ΠΎΠ²ΠΎΡ†ΠΈΡ€ΡƒΡŽΡ‰ΠΈΠ΅ Π°Π³Π΅Π½Ρ‚ΠΎΠ² (ΠΈΠ»ΠΈ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Ρ‡ΠΈΠΊΠΎΠ²) Π½Π° ΠΏΡƒΠ±Π»ΠΈΠΊΠ°Ρ†ΠΈΡŽ API-ΠΊΠ»ΡŽΡ‡Π΅ΠΉ ΠΈ Ρ‚ΠΎΠΊΠ΅Π½ΠΎΠ² Π² ΠΊΠΎΠ΄ΠΎΠ²ΡƒΡŽ Π±Π°Π·Ρƒ.

Severity Levels

Severity Incident Description within Vibe Coding Priority
πŸ”΄ Critical ВрСдоносныС ΠΈΠ½ΡŠΠ΅ΠΊΡ†ΠΈΠΈ, Π³Π°Ρ€Π°Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎ приводящиС ΠΊ ΠΊΠΎΠΌΠΏΡ€ΠΎΠΌΠ΅Ρ‚Π°Ρ†ΠΈΠΈ ΠΊΠΎΠ΄Π° ΠΈΠ»ΠΈ исполнСнию RCE силами Π°Π³Π΅Π½Ρ‚Π°. P0
🟠 High Π Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°Ρ†ΠΈΠΈ, критичСски Π½Π°Ρ€ΡƒΡˆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„ΡƒΠ½Π΄Π°ΠΌΠ΅Π½Ρ‚Π°Π»ΡŒΠ½Ρ‹Π΅ ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ‹ бСзопасности (использованиС eval, отсутствиС санации innerHTML Π² ΠΏΡ€Π°Π²ΠΈΠ»Π°Ρ… Frontend). P1
🟑 Medium Π˜Π½ΡΡ‚Ρ€ΡƒΠΊΡ†ΠΈΠΈ, ΠΏΡ€ΠΎΠ²ΠΎΡ†ΠΈΡ€ΡƒΡŽΡ‰ΠΈΠ΅ Π²ΠΎΠ·Π½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ логичСских Π΄Π΅Ρ„Π΅ΠΊΡ‚ΠΎΠ² (Bad Smells, Race conditions) Π² ΠΊΠΎΠ΄Π΅, сгСнСрированном Π°Π³Π΅Π½Ρ‚ΠΎΠΌ. P2
🟒 Low Ошибки ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΈ Π»ΠΈΠ½Ρ‚Π΅Ρ€ΠΎΠ², Π½Π΅Ρ€Π°Π±ΠΎΡ‡ΠΈΠ΅ ΠΈΠ»ΠΈ ΡƒΡΡ‚Π°Ρ€Π΅Π²ΡˆΠΈΠ΅ ΠΌΠΈΠ½ΠΎΡ€Π½Ρ‹Π΅ ΠΏΡ€Π°Π²ΠΈΠ»Π° стилизации. P3

πŸ”„ Incident Response Lifecycle

Π€ΠΎΡ€ΠΌΠ°Π»ΠΈΠ·ΠΎΠ²Π°Π½Π½Ρ‹ΠΉ процСсс ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½Π½Ρ‹Ρ… ΡƒΠ³Ρ€ΠΎΠ· Π² ΠΌΠ΅Ρ‚Π°-инструкциях прСдставлСн Π½Π° схСмС:

graph TD
    A(["ΠŸΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ» опасноС ΠΏΡ€Π°Π²ΠΈΠ»ΠΎ"]) --> B{"Оно ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΎ?"}
    B -->|"Π”Π° (P0, P1)"| C["ΠžΡ‚ΠΏΡ€Π°Π²ΠΈΡ‚ΡŒ частноС Security Advisory"]
    B -->|"НСт (P2, P3)"| D["ΠžΡ‚ΠΊΡ€Ρ‹Ρ‚ΡŒ стандартный Issue / Pull Request"]
    
    C --> E["Анализ ΡƒΠ³Ρ€ΠΎΠ· ΠΌΠ΅ΠΉΠ½Ρ‚Π΅ΠΉΠ½Π΅Ρ€Π°ΠΌΠΈ"]
    E --> F["Π˜Π·ΠΎΠ»ΡΡ†ΠΈΡ уязвимости, ΠΎΡ‚ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ ΠΏΡ€Π°Π²ΠΈΠ»Π°"]
    F --> G["Π˜ΡΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΠ΅ MD Ρ„Π°ΠΉΠ»Π° ΠΈ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠ΅ инструкций"]
    G --> H["ΠŸΡƒΠ±Π»ΠΈΠΊΠ°Ρ†ΠΈΡ Security Release & Π£Π²Π΅Π΄ΠΎΠΌΠ»Π΅Π½ΠΈΠ΅"]
    H --> I(["Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡ‚ΡŒ устранСна"])
    
    D --> G
    
    classDef critical fill:#ffebeb,stroke:#ff0000,stroke-width:2px;
    classDef safe fill:#ebffeb,stroke:#00aa00,stroke-width:2px;
    class C critical;
    class D safe;
    %% Added Design Token Styles for Mermaid Diagrams
    classDef default fill:#e1f5fe,stroke:#03a9f4,stroke-width:2px,color:#000;
    classDef component fill:#e8f5e9,stroke:#4caf50,stroke-width:2px,color:#000;
    classDef layout fill:#f3e5f5,stroke:#9c27b0,stroke-width:2px,color:#000;

    class E component;
    class F component;
    class G component;
    class H component;
    class I component;
    class B component;

Loading

πŸ›‘οΈ Best Practices for Contributors

ΠŸΡ€ΠΈ ΠΊΠΎΠ½Ρ‚Ρ€ΠΈΠ±ΡŒΡŽΡ†ΠΈΠΈ Π½ΠΎΠ²Ρ‹Ρ… инструкций ΠΈΠ»ΠΈ Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π½Ρ‹Ρ… стандартов (Ρ‡Π΅Ρ€Π΅Π· Pull Request) трСбуСтся Π½Π΅ΡƒΠΊΠΎΡΠ½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠ΅ слСдованиС ΠΏΡ€Π°Π²ΠΈΠ»Π°ΠΌ бСзопасности:

  • No Binary Files: Π—Π°ΠΏΡ€Π΅Ρ‚ Π½Π° ΠΊΠΎΠΌΠΌΠΈΡ‚ Π±ΠΈΠ½Π°Ρ€Π½Ρ‹Ρ… ΠΈ исполняСмых скриптов, Π½Π΅ ΠΏΠΎΠ΄Π΄Π°ΡŽΡ‰ΠΈΡ…ΡΡ прямому Π°ΡƒΠ΄ΠΈΡ‚Ρƒ исходного ΠΊΠΎΠ΄Π°.
  • Security Annotations: АрхитСктурныС ΠΏΠ°Ρ‚Ρ‚Π΅Ρ€Π½Ρ‹ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ΠΈ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΈ Π½Π°Π΄Π»Π΅ΠΆΠΈΡ‚ Ρ€Π°Π·ΠΌΠ΅Ρ‡Π°Ρ‚ΡŒ коммСнтариями // SECURE: с ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€Π½Ρ‹ΠΌ обоснованиСм надСТности ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Π°.
  • Path Restrictions: ΠΠ±ΡΠΎΠ»ΡŽΡ‚Π½Ρ‹Π΅ ΠΏΡƒΡ‚ΠΈ ΠΈ Π·Π°Ρ…Π°Ρ€Π΄ΠΊΠΎΠΆΠ΅Π½Π½Ρ‹Π΅ тСстовыС сСкрСты строго Π·Π°ΠΏΡ€Π΅Ρ‰Π΅Π½Ρ‹ Π² ΠΏΡ€Π°Π²ΠΈΠ»Π°Ρ… (Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, Π²Π½ΡƒΡ‚Ρ€ΠΈ backend/nestjs/security.md). ΠžΠ±ΡΠ·Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎ использованиС плСйсхолдСров, Ρ‚Π°ΠΊΠΈΡ… ΠΊΠ°ΠΊ <YOUR_SECRET_KEY>.

Π‘Π»Π°Π³ΠΎΠ΄Π°Ρ€ΠΈΠΌ Π·Π° Π²ΠΊΠ»Π°Π΄ Π² Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π½ΡƒΡŽ Ρ†Π΅Π»ΠΎΡΡ‚Π½ΠΎΡΡ‚ΡŒ ΠΈ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ AI-ΠΈΠ½ΠΆΠΈΠ½ΠΈΡ€ΠΈΠ½Π³Π° (Vibe Coding)! πŸš€

There aren't any published security advisories