Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Script Security #17

Closed
VolkanSah opened this issue Apr 26, 2023 · 3 comments
Closed

Script Security #17

VolkanSah opened this issue Apr 26, 2023 · 3 comments

Comments

@VolkanSah
Copy link

Hi there,

I noticed that the client-side code you're using for your ChatGPT script exposes API keys and endpoints, which could pose a significant security risk. To prevent this, it's recommended to store sensitive data such as API keys in a .env file or as environment variables on the server-side, rather than displaying them publicly in client-side code.

In this particular case, the API keys and endpoints should be hidden using environment variables or by loading configuration files on the server-side. This can be achieved using server-side languages such as PHP or Node.js. The client-side code can then retrieve this information from a server endpoint, rather than directly accessing it.

Additionally, when using XMLHttpRequest and other Ajax methods, it's important to perform more thorough input validation and sanitization to protect against attacks such as XSS.

I hope this helps. If you have any further questions, please let me know.

Best regards,

Volkan Sah

Explanation:
The message highlights the potential security risks of exposing API keys and endpoints in client-side code, and recommends storing sensitive data in a more secure way. It also suggests using server-side languages to hide the API keys and endpoints, and performing input validation to protect against attacks such as XSS. The message concludes by offering further assistance if needed.

@sbaliyun
Copy link
Owner

I know this is for individual and group use only

@VolkanSah
Copy link
Author

A note will be cool, cause i have seen on my servers, that a client use your script!

@VolkanSah VolkanSah reopened this Jun 17, 2023
@VolkanSah
Copy link
Author

i see you are not interested!

! As a developer you should generally create code that does not contain any security gaps. It's your security. I threw away your crap code from our servers !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants