-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apply recommended security enhancements #3085
Comments
Revisited this reported issue.
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Apply security enhancements recommended in the security guidelines for Meteor:
"1. Add package to explicitly block XSS and clickjacking attacks "
"2. Disable uncontrolled and free use of profile field assigned by default for each Meteor user"
"3. Limit the login attempts per connection to three per 10 seconds."
Description:
By adding browser-policy package, cross site scripting attacks are harder to construct. No changes to code required.
Disabling the uncontrolled user profile is recommended in the security guidelines.
Limiting/ lowering the amount the login attempts per connection will reduce the impact of brute force attacks against the user accounts.
User Story:
"As a user, I will not be prone to specially constructed harmful sites capturing the user input intended for the API portal."
"As a user, I will not be able to abuse the unlimited user profile storage provided by Meteor by default."
"As a user, my password is better secure when login attempts are limited."
The text was updated successfully, but these errors were encountered: