If you discover a security vulnerability, please email polcg10@gmail.com. Do not open a public issue.
- The portfolio includes local microservices (FastAPI planner-api on port 8765, various demo backends) intended for local development and demonstration only.
- These services have no authentication or authorization. Do not expose them to the public internet.
- Bind all demo services to
127.0.0.1to prevent accidental external access.
- Demo backend endpoints accept arbitrary input without validation or rate limiting.
- If repurposing any demo service for production use, add authentication, input validation, and rate limiting.
- Do not store sensitive data in demo services.
- The Astro static site itself has minimal attack surface since it serves pre-built HTML/CSS/JS.
- Ensure no sensitive data (API keys, credentials, personal tokens) is included in the static build output.
- Review third-party scripts and analytics for privacy implications.
- Set security headers via hosting platform:
Content-Security-Policy,X-Frame-Options,X-Content-Type-Options.
- Use separate configurations for demo vs. production services.
- Keep Astro and npm dependencies updated — run
npm auditperiodically. - If deploying to a CDN/hosting platform, enable HTTPS and configure proper caching headers.
- Review any contact forms or interactive elements for spam and injection vulnerabilities.