zGaming is a real-money gaming / fintech platform.
Security vulnerabilities may result in:
- financial loss
- user compromise
- regulatory violations
We take security seriously.
DO NOT open public issues for security bugs.
Instead:
- Email: security@yourdomain.com
- Include:
- description
- reproduction steps
- impact assessment
We will respond within 48 hours.
- Wallet / ledger logic
- Authentication / JWT
- API endpoints
- Webhooks / callbacks
- Settlement system
- RNG / provably fair
- UI bugs
- non-security config issues
- double-spend
- race conditions
- negative balance bypass
- mutation (UPDATE/DELETE)
- integrity break
- JWT forgery
- privilege escalation
- replay attacks
- signature bypass
System is designed to ensure:
- append-only ledger
- idempotent transactions
- cryptographic audit logs
- HSM-based signing (abstracted)
Researchers should attempt:
- replay attacks
- concurrent requests
- malformed payloads
- signature tampering
If running a bounty:
- Critical: $$$$
- High: $$$
- Medium: $$
- Low: $
Do NOT:
- access other usersβ data
- perform destructive actions
Stay within safe testing boundaries.
The repository currently resolves @fastify/jwt@10.0.0 which pulls in fast-jwt@6.1.0.
Verification commands run in project root:
pnpm update fast-jwtβ already up to datepnpm why fast-jwtβ@fastify/jwt 10.0.0 -> fast-jwt 6.1.0pnpm auditβ reports GHSA-mvf2-f6gm-w987 affectingfast-jwt <= 6.1.0
As of April 3, 2026, pnpm audit still flags a critical advisory for fast-jwt with no patched version published in the advisory feed.
Because this project depends on @fastify/jwt, remediation may require either:
- an upstream
@fastify/jwtrelease that adopts a patchedfast-jwt, or - temporary risk controls (strict algorithm allowlisting, strong claim validation, and key-rotation controls) until a patched release is available.