## Summary
This PR closes the third and final piece of the server-function security
series. PR #421 made the action token tamper-evident; PR #422 added the
kill-switch for apps that don't use server functions at all. What was
still missing — and what this lands — is a way to declare *what shape*
an action expects from the wire, so the runtime can reject malformed
payloads at the protocol layer instead of letting them reach handler
code where intent is lost.
The API is `createFunction`, exported from a new
`@lazarv/react-server/function` subpath. It wraps a `"use server"`
handler with a per-arg parse/validate spec, the bundler forwards that
spec to `registerServerReference`, and the protocol decoder consults it
on every call. Bad inputs are caught during decode and the request fails
with `HTTP 400` and an `x-react-server-action-error: <reason>` header
before any handler code runs. Bare `"use server"` actions without
`createFunction` keep working unchanged — validation is opt-in and
additive.
## The API
The most common shape is the array shorthand:
`createFunction([z.string(), z.number()])(handler)`. The slot index is
the *runtime arg slot* — what the client puts on the wire at position
`i` — not the handler signature param. When you also need pre-validate
parsing, the object form takes both arrays explicitly: `createFunction({
parse: [...], validate: [...] })(handler)`. The no-spec form
`createFunction()(handler)` exists too; it attaches the marker so the
dev-strict warning treats the export as deliberately unvalidated. Bound
captures (closure values from `.bind(...)` or render-time closures) are
explicitly *not* part of the validation contract — they're
integrity-protected by the AEAD action token from #421, not validated as
user inputs.
The full TypeScript story comes for free with this API. The handler's
parameter types are inferred from the schemas via the same
`ValidateSchema<T>` / `InferSchema<T>` machinery the typed router
already uses, so any Standard Schema (Zod, Valibot, ArkType, generic
`.parse()`) works as a slot constraint. Hovering an `addEntry` call site
that was declared with `z.object({ name: z.string() })` shows `(input: {
name: string }) => Promise<…>` — derived directly from the schema, no
manual type annotation. Misuse at the call site is a TypeScript error,
not a runtime surprise.
## Wire-aware helpers
A Standard Schema isn't enough for every Flight wire type. Some
validations need to bound resource consumption before the handler
observes the value (file uploads, byte buffers); some need to wrap an
async source so the bound is enforced as the handler consumes (streams,
async iterables); some need a constructor allowlist that's narrowed in
TypeScript via `instanceof` rather than a string-name lookup (typed
arrays). For each of those cases there's a dedicated wire-aware helper.
`formData(shape, options?)` declares a sub-FormData with declared-key
entries (no prefix scan, an attacker-injected `5_role=admin` is rejected
by default), and inside it `file({ maxBytes, mime })` and `blob(...)`
enforce per-entry size and MIME synchronously against `Blob.size` /
`Blob.type`. `arrayBuffer({ maxBytes })` caps byte length on `$AB`,
`typedArray({ ctor: Float32Array, maxBytes })` does the same for `$AT`
while narrowing the inferred handler type to the exact `Float32Array`
instance. `map({ maxSize, key, value })` and `set({ maxSize, value })`
cap collection size and route inner key/value validation through the
same Standard Schema bridge. `stream({ maxChunks, maxBytes })` covers
both the text (`$r`) and binary (`$b`) Flight stream tags by wrapping
the materialized `ReadableStream` in a `TransformStream` that errors
instead of yielding past the cap. `asyncIterable({ maxYields, value })`
and `iterable(...)` do the same for `$x` and `$X`, with each yielded
value flowing through the inner schema as the handler pulls.
`promise(value)` wraps `$@` so the resolved value runs through the
schema before reaching the handler. There's also a `noop` export — an
identity sentinel that reads as intent at the call site when only some
slots need validation, so users don't have to write sparse-array
literals or bare `undefined`.
## Decoder integration and error semantics
In `@lazarv/rsc`, `registerServerReference` gained an optional fourth
`meta` argument and a paired `lookupServerFunctionMeta` for hosts to
query at decode time. `decodeReply`'s options grew `actionId`,
`resolveServerFunctionMeta`, and `validateArg` hooks; when all three are
present the decoder switches from the legacy whole-tree walk to the new
slot-walk in `walkArgsWithMeta`, which applies parse → validate
slot-by-slot and aborts on the first failure with a new
`DecodeValidationError`. The error carries the failing `argIndex`, the
recovered `actionId`, a coarse `reason` code (`validate_failed`,
`parse_failed`, `unknown_entry`, `max_bytes_exceeded`,
`max_size_exceeded`, `max_chunks_exceeded`, `max_yields_exceeded`,
`mime_not_allowed`, `wire_shape_mismatch`, `missing_entry`,
`duplicate_entry`, `custom_validate_failed`, `max_bound_args_exceeded`),
and the underlying schema diagnostic in `original`. The legacy `$h` path
in `shared.mjs` got a parallel structural defense-in-depth pass: when an
action has registered meta and the encrypted token already delivered
bound captures, any non-empty wire-supplied `parsed.bound` is rejected
as a wire-shape mismatch — the trusted channel for closure captures is
the AEAD-protected token, not the wire's `bound` field.
## Dispatcher and dev guardrail
In `render-rsc.jsx`, the action-call dispatch now pre-resolves the
action id (header decrypt or `$ACTION_ID_*` form-field scan) *before*
`decodeReply`, then preloads the action's source module via
`requireModule` so the meta registry is populated by the time the
slot-walk asks for it. Without this preload, every action's first
invocation would silently skip validation because the registry is filled
by the module's top-level `registerServerReference` calls, which run
only after import. Validation failures map to HTTP 400 with the reason
in `x-react-server-action-error`. Schema diagnostics deliberately don't
travel to the client — they can leak expected-shape details that aid
attackers — but they're written to the server log via `logger.warn` for
operator visibility. There's also a dev-only guardrail: each unwrapped
`"use server"` action logs a one-time warning the first time it's
called, naming the action in the same `<modulePath>#<exportName>` form
the registry keys on, in a styled message that distinguishes file paths
(gray italic) from JS code (magenta) and import specifiers (cyan). Set
`config.serverFunctions.strict = false` to silence it during incremental
migrations.
Summary
Server-emitted bound captures of server functions — the closure variables of inline
"use server"functions and the arguments passed to a server-side.bind(...)— used to travel plaintext on the wire as part of the$houtlined chunk'sboundarray. A malicious client could submit a legitimate action token paired with attacker-chosen bound values, swapping a captureduserId=42foruserId=99and updating a different user's data while authenticated as someone else. Classic IDOR / bound-arg tampering.This PR bundles every action's bound capture array into the same AES-256-GCM token that already protects action identity. Token plaintext becomes
[actionId, boundBytesAsBase64], where the bound bytes come from@lazarv/rsc's sync flight encoder. Bound values never travel plaintext on the wire, and any tampering — at the token, the action id, or the bound payload — invalidates the GCM auth tag and the call is rejected before the action runs.Why an AEAD primitive instead of a separate HMAC
The first attempt sat an HMAC tag alongside the plaintext bound on the wire, then bound
(id, bound, sig)together at verification time. That approach had a fundamental architectural flaw: by the time the user clicks a bound action,callServerpackages the bound prefix as positional args (not as a$hreference) so it lands in the call body indistinguishably from runtime args. There is no$hchunk in the call body to attach a sig to, and the dispatcher cannot tell which of the positional args were "bound" vs "user-supplied". Tampering would have been undetectable in the dominant code path.Encoding the bound array inside the encrypted action token closes this by removing the bound prefix from the wire entirely. The client sends only runtime args; the server recovers bound by decrypting the token and prepends it before invoking the action. There is nothing for an attacker to tamper with.
Type fidelity is the load-bearing detail
A naive implementation would
JSON.stringifythe bound array into the token plaintext. That silently strips type information fromDate,BigInt,Map,Set,RegExp,URL,URLSearchParams, typed arrays — every typed value the wire format already supports throughdecodeReply. After a round-trip, the action would receive astringwhere it expected aDate, etc. Bound captures are now routed throughsyncToBuffer/syncFromBuffer, the existing public sync flight serialization pair on@lazarv/rsc. Bound captures travel through the same$<tag>scheme thatdecodeReplyalready speaks for client-supplied args, so any typed value the framework supports anywhere else also survives bound-capture round-trip with full fidelity.Implementation
packages/react-server/server/action-crypto.mjsgainsencryptActionToken(actionId, bound)anddecryptActionToken(token). The encrypt path runsboundthroughsyncToBufferto get aUint8Array, base64-encodes it, and embeds it as the second element of the JSON plaintext[actionId, boundBytesAsBase64 | null]. The decrypt path inverts that: parse JSON, decode base64, runsyncFromBufferto recover the typed array.encryptActionIdbecomes a thin delegator overencryptActionToken(id, null)so existing callers keep working with the unified plaintext format.decryptActionIddelegates todecryptActionTokenand returns just the action id. A small fallback inparseTokenPlaintextaccepts pre-upgrade plain-string plaintexts as{ actionId, bound: null }so tokens issued before this change are still valid during a rolling deploy.packages/react-server/server/action-register.mjsupdatescreateServerRefBindso the cached$$idgetter returnsencryptActionToken(fullId, accumulatedBound)rather thanencryptActionId(fullId). The bound array is plaintext on the function (needed forFunction.prototype.bindinvocation and for progressive-enhancement form rendering) but only the encrypted token form goes onto the wire. The unboundregisterServerReferencepath still usesencryptActionId, which now produces a token whose plaintext is[fullId, null]— same shape, no special case at decrypt time.packages/react-server/server/render-rsc.jsxdoes three things. It exposes aresolveServerReferenceon the runtime'smoduleResolverthat returns{ id: ref.$$id, bound: null }for every server reference, so the flight serializer skips its plaintext-bound fallback. The header-based action dispatcher and the progressive-enhancement form-field dispatcher both calldecryptActionTokeninstead ofdecryptActionId, recover any token-encoded bound, and prepend it to the runtime args before invoking the action. ThedecodeReplywrapper passes adecryptServerReferenceIdhook into@lazarv/rscso the callback-arg case (a bound server reference passed as a value to another server function call) decrypts the inner token and prepends its bound at bind time.packages/rsc/server/shared.mjsandpackages/rsc/server/reply-decoder.mjsadd the host-supplied hooks. The flight serializer now honorsmetadata.boundfromresolveServerReferencewhen explicitly provided, falling back tovalue.$$boundonly when the resolver doesn't speak. The reply decoder accepts adecryptServerReferenceIdoption that, when present, transforms the$hchunk's id into{ actionId, bound }; the recovered bound is prepended to any wire-supplied bound array before binding. Both branches stay no-op by default —@lazarv/rscitself has no opinion about token formats and remains runtime-agnostic.Migration
Backward compatible. The encryption key resolution chain (
serverFunctions.secret/secretFile, env vars,previousSecrets/previousSecretFiles) is unchanged and covers both action identity and bound captures under one key. Tokens issued by an older runtime version that's still serving traffic during a rolling deploy decode cleanly via the legacy plain-string fallback inparseTokenPlaintext. There are no new configuration flags and no transitional period to manage.Tests
test/__test__/action-crypto.spec.mjscovers token roundtrip across primitive and structured bound values, tamper detection (single-byte flip, truncation, non-base64), key rotation (sign under previous, decrypt under primary or rotation), legacy plain-string plaintext compatibility,encryptActionId/decryptActionIdthin-wrapper semantics, and a full typed-value matrix assertingDate,BigInt,Map,Set,RegExp,URL,URLSearchParams, and typed arrays each survive the encrypt/decrypt round-trip with bothinstanceofand value equality. A nested-mix case asserts that typed values inside structured bound (aDateinside an object inside an array, aMap<string, Object[]>, etc.) all round-trip together.packages/rsc/__tests__/flight-bound-args-integrity.test.mjscovers the protocol layer: that a resolver returningbound: nulloverrides$$boundand emits no plaintext bound on the wire, that the unbound case carriesbound: nullend-to-end, that consumers without a resolver still get the legacy serialization (back-compat for plain@lazarv/rscusers), and that the$hdecoder hook is invoked on token-encoded ids in the callback-arg case and prepends recovered bound to any wire-supplied bound.The existing
test/__test__/use-inline.spec.mjs("use server inline with captured variables") exercises the full pipeline — page render → flight stream → client decode → callServer → decrypt → dispatch — with closures capturing render-time data. It is the load-bearing E2E for this change and continues to pass without modification.Docs
docs/src/pages/en/(pages)/guide/server-functions.mdxand the Japanese mirror gain a Security section covering action identity and bound captures, key resolution order, key rotation pattern, semantics of client-side.bind()extensions (treated as runtime args, not as new captures), and the one known limitation: bound captures whose values areFileorBlobcarry the slot reference in the token but not the binary content, which is rare in practice but worth flagging. The Japanese file also gets<Link name>anchors that match the EN convention and a closing fence for a previously dangling code block.