Inori
FeaturesToolsPricing
Learn
GuidesStep-by-step tutorials and walkthroughs
GlossaryInsurance and compliance terminology
CompareSee how Inori compares to alternatives
Support
Help CenterFind answers and get support
ChangelogLatest updates and improvements
DemoSee Inori in action
Legal
PrivacyHow we handle your data
TermsTerms of service and usage
Blog
Sign InStart Free

Product

  • Features
  • Pricing
  • Tools
  • Demo

Resources

  • Help Center
  • Guides
  • Glossary
  • Compare

Company

  • About
  • Blog
  • Changelog
  • Contact

Legal

  • Privacy
  • Terms
  • DPA
  • Security

© 2026 Inori Inc.

  1. Home
  2. /Changelog
  3. /Security Hardening & Test Suite
March 31, 2026improvement

Security Hardening & Test Suite

18 security tests passing with rate limiting, CSP enforcement, and 95% overall test coverage.

Harden the platform against common attack vectors and bring the test suite to production-grade reliability.

  • 18 security tests passing — A dedicated security test suite validates authentication flows, authorization boundaries, input sanitization, CSRF protection, and header enforcement, with all 18 tests passing consistently across local and CI environments.
  • Rate limiting on authentication — Login, registration, and password reset endpoints enforce per-IP rate limits (10 attempts per minute for login, 5 for registration) using a sliding window algorithm, returning 429 responses with Retry-After headers when thresholds are exceeded.
  • API endpoint rate limiting — All authenticated API routes enforce per-user rate limits (100 requests per minute for standard endpoints, 20 per minute for AI analysis) to prevent abuse and ensure fair resource allocation across accounts.
  • Content Security Policy enforcement — A strict CSP header restricts script sources to self and trusted CDNs, blocks inline scripts except those with nonces, prevents framing by external domains, and reports violations to a dedicated logging endpoint for monitoring.
  • Test suite pass rate — Overall test coverage improved from 27% (61/225 passing) to 95% (213/225 passing) by fixing flaky async tests, mocking external service dependencies, and resolving environment-specific timing issues across 29 test files.
  • TEST_MODE infrastructure — A TEST_MODE environment variable disables non-deterministic behaviors (email sending, webhook dispatching, usage metering) during automated test runs without altering business logic, ensuring tests remain fast and repeatable.
  • DISABLE_RATE_LIMIT flag — Test environments can set DISABLE_RATE_LIMIT to bypass throttling during automated test execution, preventing false failures from rate limit enforcement while keeping limits active in staging and production.
  • CSP development mode — The Content Security Policy allows unsafe-eval exclusively in development mode to support hot module replacement and React DevTools, with a strict policy automatically applied in production and staging builds.