Skip to content

Hash Passwords #9

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
Binit08 opened this issue Apr 8, 2025 · 3 comments · May be fixed by #42
Open

Hash Passwords #9

Binit08 opened this issue Apr 8, 2025 · 3 comments · May be fixed by #42
Assignees

Comments

@Binit08
Copy link

Binit08 commented Apr 8, 2025

Difficulty: 🟡 Medium
Labels: enhancement, security, auth

📝 Description:
Currently, passwords are stored in plain text in the database, which poses a major security risk. If the database is compromised, all user credentials are exposed.

🎯 Goal:
Use a cryptographic hashing library such as OpenSSL or bcrypt to securely store hashed passwords instead of raw text.

@Eshan549
Copy link

Hi @Binit08 bhaiya,
I'd like to quickly resolve this issue. My plan is to implement bcrypt hashing using libbcrypt to ensure passwords are stored securely. Given the urgency, I'll submit the PR within 24 hours.

Could you please assign this issue to me promptly?
Thanks!

@rupjyoti-patgiri
Copy link
Collaborator

Assigned

@HilariousSoupXD
Copy link
Contributor

HilariousSoupXD commented Apr 11, 2025

Since Eshan549 hasn't yet made a PR, I would like to offer my idea to fix the above solution:

  1. Hash passwords before inserting them into the DB.
  2. Verify password input by hashing it and comparing with stored hash.
  3. Use SHA-256f hashing.

I understand this issue has already been assigned but would none the less appreciate if my PR would be considered as well. Other than that, it's a fun problem to tackle and the experience alone would suffice otherwise.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants