We actively maintain and provide security updates for the following versions of @oaknetwork/payments-sdk:
| Version | Supported |
|---|---|
| 1.x | ✅ Active support |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a vulnerability in the Oak SDK, we ask that you follow responsible disclosure practices and report it privately so we can address it before any public disclosure.
- Email: security@oaknetwork.org
- General support: support@oaknetwork.org
- GitHub Private Advisories: Report a vulnerability
When reporting, please include as much detail as possible:
- A clear description of the vulnerability
- Steps to reproduce the issue
- The potential impact and attack surface
- Any proof-of-concept code (if available)
- The SDK version(s) affected
| Timeline | Action |
|---|---|
| Within 48 hours | Acknowledgment of your report |
| Within 7 days | Initial severity assessment and triage |
| Within 30 days | A patch or mitigation plan for confirmed vulnerabilities |
| Within 90 days | Public disclosure (coordinated with reporter) |
We follow coordinated vulnerability disclosure (CVD) principles. We will keep you informed throughout the process and aim to resolve confirmed vulnerabilities within 30 days. For complex issues, we may request an extension and will communicate transparently about the timeline.
The following are in scope for vulnerability reports:
- Authentication and token management flaws (
OAuth 2.0client credentials flow) - Webhook signature verification bypass or timing-attack vulnerabilities
- Credential or secret exposure through SDK APIs
- Dependency vulnerabilities with direct security impact on SDK consumers
- Type-safety issues that could lead to injection or data leakage
The following are out of scope:
- Vulnerabilities in the Oak Network backend API itself (please contact Oak Network directly)
- Issues in third-party dependencies without a clear exploit path through this SDK
- Denial-of-service attacks that require significant resources or special access
- Social engineering attacks
To use the Oak SDK securely in your applications:
- Never hardcode credentials — store
clientIdandclientSecretin environment variables - Never commit
.envfiles — add them to.gitignore - Always verify webhook signatures — use
verifyWebhookSignature()orparseWebhookPayload()before processing any webhook event - Use separate credentials for sandbox and production environments
- Do not log or expose
clientSecretor access tokens in application logs - Keep the SDK updated — subscribe to GitHub releases to stay informed about security patches
- OAuth 2.0 client credentials flow with automatic token caching
clientSecretis not exposed on the client config object (as of v0.2)- HMAC-SHA256 webhook signature verification with timing-safe comparison to prevent timing attacks
- Exponential backoff with jitter on retries to mitigate thundering herd scenarios
- Strict TypeScript types with
unknownfor unvalidated external data
We are committed to working with security researchers and the community to ensure the safety of our SDK. Once a vulnerability is confirmed and a fix is available, we will:
- Release a patched version as soon as possible
- Publish a GitHub Security Advisory
- Update the CHANGELOG.md with details about the fix
- Credit the reporter (unless they prefer to remain anonymous)
We ask that reporters allow us up to 90 days from initial report to public disclosure to give users time to update.
For security-related inquiries, reach out to security@oaknetwork.org.
For general questions, visit oaknetwork.org or open a GitHub Discussion.