Skip to content

docs(readme): expand database, security, and enhancement sections#3

Merged
mbongeb merged 1 commit intomainfrom
docs/expand-readme-sections
Feb 9, 2026
Merged

docs(readme): expand database, security, and enhancement sections#3
mbongeb merged 1 commit intomainfrom
docs/expand-readme-sections

Conversation

@mbongeb
Copy link
Copy Markdown
Owner

@mbongeb mbongeb commented Feb 9, 2026

Expands the README with:

  • Deploy & Test — curl commands using $INGEST_URL / $READ_URL env vars
  • Database Choice — DynamoDB rationale with PAY_PER_REQUEST and access pattern trade-offs
  • Data Model — LogTable schema, DateTimeIndex GSI design, hot partition trade-off
  • Logging & CloudWatch Cost Controls — error-only event logging pattern
  • Function URL Exposure — public auth risks and production hardening recommendations
  • Known Security Concerns — CWE-306, crash risks, input validation gaps
  • Future Enhancements — DLQ for retries, OpenSearch/Kibana visualization

- Split database section into Database Choice and Data Model with
  trade-off analysis for GSI hot partition and access patterns
- Add Deploy & Test section using environment variables for URLs
- Add Logging & CloudWatch Cost Controls section documenting the
  error-only event logging pattern
- Add Function URL Exposure section with production hardening notes
- Add Known Security Concerns: CWE-306 auth, crash risks, input gaps
- Add Future Enhancements: DLQ for retries, OpenSearch/Kibana
  visualization, additional hardening items
@mbongeb mbongeb merged commit fda8ba2 into main Feb 9, 2026
2 checks passed
@mbongeb mbongeb deleted the docs/expand-readme-sections branch February 9, 2026 23:20
Copy link
Copy Markdown

@amazon-q-developer amazon-q-developer Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary

This PR significantly expands the README documentation with comprehensive deployment instructions, architecture details, and security considerations. The documentation quality is excellent and provides valuable context for users.

Critical Issues (2):

  1. External link to unapproved domain (alexwlchan.net) must be removed
  2. Missing CWE reference link for authentication vulnerability

Overall Assessment:
The documentation improvements are valuable and well-structured. Once the external link policy violations are addressed, this will be ready to merge.


You can now have the agent implement changes and create commits directly on your pull request's source branch. Simply comment with /q followed by your request in natural language to ask the agent to make changes.

Comment thread README.md

## Logging & CloudWatch Cost Controls

Both Lambda functions use Python's `logging` module and follow an **error-only event logging** pattern inspired by [alexwlchan's blog post](https://alexwlchan.net/2018/error-logging-in-lambdas/):
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛑 Security Documentation: Remove the external link to alexwlchan.net. Only links to approved domains (https://cwe.mitre.org) are permitted. Reference the blog post by name without including the URL.

Suggested change
Both Lambda functions use Python's `logging` module and follow an **error-only event logging** pattern inspired by [alexwlchan's blog post](https://alexwlchan.net/2018/error-logging-in-lambdas/):
Both Lambda functions use Python's `logging` module and follow an **error-only event logging** pattern inspired by alexwlchan's blog post on error logging in Lambdas:

Comment thread README.md
Comment on lines +188 to +189
**Authentication (CWE-306):**
- Lambda Function URLs use `auth_type=NONE`, exposing both ingest and read endpoints publicly without authentication
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛑 Security Reference: Add CWE reference link for the authentication vulnerability. This helps readers understand the specific security weakness being documented.

Suggested change
**Authentication (CWE-306):**
- Lambda Function URLs use `auth_type=NONE`, exposing both ingest and read endpoints publicly without authentication
**Authentication (CWE-306):[^1]**
- Lambda Function URLs use `auth_type=NONE`, exposing both ingest and read endpoints publicly without authentication

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants