Token Security
API tokens provide full access to your server data and operations. Treat them as sensitive credentials.Storage Requirements
- Environment Variables
- Secrets Management
- Configuration Services
Recommended ApproachNever commit
.env files to version control.Security Violations
Never:- Commit tokens to version control (Git, SVN, etc.)
- Include tokens in client-side code or JavaScript bundles
- Share tokens in chat messages, emails, or documentation
- Log tokens in application logs or error messages
- Store tokens in browser local storage or cookies
Token Lifecycle Management
Token Rotation
Token Rotation
Recommended Schedule: Every 90 days minimum
Emergency Revocation
Emergency Revocation
Immediate Actions for Compromised Tokens:
- Revoke token immediately via Melonly dashboard
- Generate replacement token with new name/identifier
- Update all applications using the compromised token
- Review audit logs for unauthorized activity
- Investigate breach source and remediate vulnerability
Network Security
HTTPS Requirements
All API communication must use HTTPS. HTTP connections are rejected.IP Restrictions
Consider implementing IP allowlisting at your application level:Application Security
Input Validation
Always validate data before sending to the API:Error Handling
Implement secure error handling that doesn’t expose sensitive information:Audit and Compliance
Request Logging
Log API requests for security monitoring (without exposing tokens):Incident Response
Suspected Token Compromise
- Immediate containment - Revoke token via dashboard
- Damage assessment - Review audit logs for unauthorized actions
- System remediation - Update affected applications with new tokens
- Root cause analysis - Identify and fix the compromise vector
- Prevention measures - Implement additional security controls
Security Contact
For security vulnerabilities in the Melonly API itself (not implementation issues), contact:[email protected]
Scope Limitation: Security support is limited to API infrastructure vulnerabilities only. Implementation security, token management, and application-level security issues are not supported.
