Previously only TOTP-enabled triggered an email. Every other security-relevant change — password change, TOTP disable, passkey add/remove, API key create/revoke, email address change, backup-code regeneration — happened silently, so an attacker on a stolen session could quietly drop 2FA or hijack the email with no signal to the account holder. Add SecurityMailer with one method per event. Each email carries the request IP, user-agent, and timestamp so the user can spot unfamiliar activity. Email-address changes notify both the old and new addresses with directional language; the old-address copy explicitly warns that whoever made the change can now receive password reset emails. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
9 lines
195 B
Plaintext
9 lines
195 B
Plaintext
<p>Hello,</p>
|
|
|
|
<p>
|
|
A passkey (<strong><%= @nickname %></strong>) was just removed from your
|
|
Clinch account (<strong><%= @user.email_address %></strong>).
|
|
</p>
|
|
|
|
<%= render "event_metadata" %>
|