Skip to content

Conversation

@harsh-hak
Copy link

By reducing the token expiry time, active sessions are limited to shorter lifespans. This minimizes the window of opportunity for attackers to exploit stolen or intercepted tokens, thereby mitigating the risk of session hijacking and strengthening overall security.

Copy link
Contributor

@elanlaw1206 elanlaw1206 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi Harsh,

Thanks for the nice improvement. reducing the access-token lifetime is a sensible security hardening step, and the change itself is clean and easy to follow.

A couple of small things to tidy up before/around merge:

  • The comment in authService.js still says “15 minutes” while the value is now 10m, just update the comment for clarity.
  • This PR also includes some Vulnerability_Tool files and .docx artifacts. They look unrelated to the token-expiry change, so suggest removing them from this PR (or handling them separately) to keep scope clean.

Overall direction looks good. Thanks for tightening the session window.

Thanks!
King Hei

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants