Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent possible phishing from misuse of ipfs gateway #52

Merged
merged 1 commit into from
Jan 25, 2019

Conversation

barlock
Copy link
Contributor

@barlock barlock commented Jan 24, 2019

Related Issue
Supports #45

Related PRs
This PR is not dependent on any other PR

What does this PR do?
I realized that allowing any domain to forward to any arbitrary ipfs hash could lead to weird cookie things or phishing if a site were vulnerable to XSS. I'm preventing that.

Description of Changes
Modified the viewer request where the bug was.

I was balancing between two concerns with this one. I think it would be cool if a site could work on a normal ipfs gateway, at which point sites could have links to their own content. So I allowed that to work as it seems safe.

I'd be curious if there are opposing thoughts.

What gif most accurately describes how I feel towards this PR?
fishing

@brian-lc
Copy link

We might want to consider running a scan against the final site to see if there are any other exploits that could be an issue.

@barlock
Copy link
Contributor Author

barlock commented Jan 25, 2019 via email

@barlock barlock mentioned this pull request Jan 25, 2019
2 tasks
@barlock barlock merged commit d108ddf into master Jan 25, 2019
@barlock barlock deleted the ipfs-forward branch January 25, 2019 16:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants