You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 2, 2022. It is now read-only.
This serves as a checklist for security related concerns, completed items will be crossed out
Some points are irrelevant for the current state of the project and can be left out.
Feel free to add, modify or remove anything if you think this should be done.
Refer to OWASP cheat cheats and guidelines for in depth details. The rules here are not disjoint in the sense that some mitigations may be relevant for multiple points.
This serves as a checklist for security related concerns, completed items will be crossed out
Some points are irrelevant for the current state of the project and can be left out.
Feel free to add, modify or remove anything if you think this should be done.
Refer to OWASP cheat cheats and guidelines for in depth details.
The rules here are not disjoint in the sense that some mitigations may be relevant for multiple points.
nginx footprints:
XSS
Filenames(don't use or use with caution or use IDs instead)Cookies(not very relevant)
CSRF
csrf protection is currently disabledbut token is stored on localstorageClickjacking
XST(not very relevant)disable http TRACE(should be by default).File Extensionsfile extension rules allowed (check them)verify rules (rules indeed allowed)SSLversionalgorithmkey lengthHSTSFollow guidelines for setting the HTTP Strict Transport SecurityPassword quality
rules implementedrules applied globallyregisterreset passwordfrontend gives feedbackInvalidate user token
logoutreset passwordData Validation
tokens generated are cryptographically securesalts are usedCORSsame origin in productionCSP
Emails
MISC
The text was updated successfully, but these errors were encountered: