Conversation
|
XSS is typically solved via CSP and x-frame-options, plus CORS headers. Wrapping every single |
|
@automaton82 Thanks! Yes CSP and CORs can be handled in multiple ways. This PR and Removal of localstorage PR are the first steps towards improving overall security. Additional PRs will be needed to get to the desired state. As we traverse the path towards the desired state, we need to take baby steps to ensure that these modifications do not break backward compatibility. As you rightly pointed out, CSP/CORS would be handled differently if this was a greenfield exercise. Currently, Flowise is used by a number of users in ways that are not fully documented. While the current implementation is slightly messy, it prevents most cases of Reflected XSS. Next PRs will address DOM XSS and Storage XSS along with introducing Basic CSP (violation reporting). Further to those changes, we will then implement the final set of changes to enforce policies and lockdown the complete application. Hope this note provides some clarity on the overall thinking towards improving security in Flowise |
# Conflicts: # packages/server/src/index.ts
|
I love this newer approach, much cleaner, but the library |
this looks like a better library and its up to date - https://github.com/apostrophecms/sanitize-html. |
No description provided.