| Version | Supported |
|---|---|
| 1.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue
- Email security concerns to the maintainers
- Include detailed reproduction steps
- Allow reasonable time for a fix before public disclosure
-
Change default credentials
- Set strong
POSTGRES_PASSWORD - Change
BITCOIN_RPC_USERandBITCOIN_RPC_PASSWORD
- Set strong
-
Network security
- Use a reverse proxy with TLS (handled by Coolify)
- Restrict Bitcoin RPC access to internal network
- Consider firewall rules for P2P ports
-
Data protection
- Regular backups of PostgreSQL and BTCPay data
- Secure backup storage
- Test recovery procedures
-
Updates
- Keep all container images updated
- Monitor BTCPay Server security advisories
- Subscribe to Bitcoin Core security announcements
- Never commit
.envfiles with real credentials - Use Coolify's secret management for sensitive values
- Rotate credentials periodically
- Images are pulled from official sources
- Containers run with minimal privileges
- Health checks ensure service availability
-
Bitcoin RPC: By default, RPC is accessible within the Docker network. Do not expose externally.
-
PostgreSQL: Uses
scram-sha-256authentication in production. Development mode usestrustfor convenience. -
BTCPay Server: Ensure HTTPS is configured via reverse proxy before accepting real payments.
This project relies on upstream security practices from: