Security and Authentication
- Authentication: OAuth2 / JWT-based authentication.
- Role-Based Access Control (RBAC): Ensures only authorized users can execute queries.
- Database Credentials Management: Securely stored in environment-specific configurations.
- Query Injection Protection: Queries use parameterized execution to prevent SQL injection.