Security audit checklist for this project. Preloaded into security agent. Covers Stripe secret handling, XSS, injection, and OWASP Top 10 issues relevant to this stack.
STRIPE_SECRET_KEY referenced ONLY in netlify/functions/ — never in HTML, JS, or any frontend filepriceId validated against ALLOWED_PRICES server-side before creating a sessionsuccess_url and cancel_url use process.env.BASE_URL — not hardcodedstripe-signatureinnerHTML, document.write, eval(), or $.html() called with untrusted dataJSON.parse(event.body) in try/catch — null body handledrequire() with user-controlled pathsconsole.log of secret values or tokens.env file committed (verify .gitignore includes .env)package.json stripe version is current (check for known CVEs)## Security Audit Report
### Summary
Overall risk: LOW | MEDIUM | HIGH | CRITICAL
### Findings
#### 🔴 Critical
- [file:line] Vulnerability — Impact — Remediation
#### 🟠 High
- [file:line] Vulnerability — Impact — Remediation
#### 🟡 Medium
- [file:line] Vulnerability — Impact — Remediation
#### 🔵 Informational
- [file:line] Observation — Recommendation
### Sign-off
PASS | FAIL — [brief justification]