Files
Will Chen c50527b4c0 Security Panel MVP (#1660)
TODOs:

- [x] Add documentation
- [x] e2e tests: run security review, update knowledge, and fix issue
- [x] more stringent risk rating


<!-- CURSOR_SUMMARY -->
---

> [!NOTE]
> Introduces a new Security mode with a Security Review panel that runs
reviews, edits rules, parses findings via IPC, and supports fixing
issues, with tests and prompt/runtime support.
> 
> - **UI/Preview Panel**:
> - Add `security` preview mode to `previewModeAtom` and ActionHeader
(Shield button).
> - New `SecurityPanel` showing findings table (sorted by severity), run
review, fix issue flow, and edit `SECURITY_RULES.md` dialog.
>   - Wire into `PreviewPanel` content switch.
> - **Hooks**:
>   - `useSecurityReview(appId)`: fetch latest review via IPC.
> - `useStreamChat`: add `onSettled` callback to invoke refreshes after
streams.
> - **IPC/Main**:
> - `security_handlers`: `get-latest-security-review` parses
`<dyad-security-finding>` from latest assistant message.
>   - Register handler in `ipc_host`; expose channel in `preload`.
>   - `ipc_client`: add `getLatestSecurityReview(appId)`.
> - `chat_stream_handlers`: detect `/security-review`, use dedicated
system prompt, optionally append `SECURITY_RULES.md`, suppress
Supabase-not-available note in this mode.
> - **Prompts**:
> - Add `SECURITY_REVIEW_SYSTEM_PROMPT` with structured finding output.
> - **Supabase**:
> - Enhance schema query to include `rls_enabled`, split policy
`using_clause`/`with_check_clause`.
> - **E2E Tests**:
> - New `security_review.spec.ts` plus snapshots and fixture findings;
update test helper for `security` mode and findings table snapshot.
> - Fake LLM server streams security findings for `/security-review` and
increases batch size.
> 
> <sup>Written by [Cursor
Bugbot](https://cursor.com/dashboard?tab=bugbot) for commit
5022d01e22a2dd929a968eeba0da592e0aeece01. This will update automatically
on new commits. Configure
[here](https://cursor.com/dashboard?tab=bugbot).</sup>
<!-- /CURSOR_SUMMARY -->
2025-10-29 17:32:52 -07:00

6.1 KiB

OK, let's review the security.

Here are variations with different severity levels.

Purposefully putting medium on top to make sure the severity levels are sorted correctly.

Medium Severity

**What**: The file upload endpoint accepts any file type without validating extensions or content, only checking file size

Risk: An attacker could upload malicious files (e.g., .exe, .php) that might be executed if the server is misconfigured, or upload extremely large files to consume storage space

Potential Solutions:

  1. Implement a whitelist of allowed file extensions (e.g., .jpg, .png, .pdf)
  2. Validate file content type using magic numbers, not just the extension
  3. Store uploaded files outside the web root with random filenames
  4. Implement virus scanning for uploaded files using ClamAV or similar

Relevant Files: src/api/upload.ts

**What**: POST, PUT, and DELETE endpoints don't implement CSRF tokens, making them vulnerable to cross-site request forgery attacks

Risk: An attacker could trick authenticated users into unknowingly performing actions like changing their email, making purchases, or deleting data by visiting a malicious website

Potential Solutions:

  1. Implement CSRF tokens using a library like csurf for Express
  2. Set SameSite=Strict or SameSite=Lax on session cookies
  3. Verify the Origin or Referer header for sensitive operations
  4. For API-only applications, consider using custom headers that browsers can't set cross-origin

Relevant Files: src/middleware/auth.ts, src/api/*.ts

Critical Severity

**What**: User input flows directly into database queries without validation, allowing attackers to execute arbitrary SQL commands

Risk: An attacker could steal all customer data, delete your entire database, or take over admin accounts by manipulating the URL

Potential Solutions:

  1. Use parameterized queries: db.query('SELECT * FROM users WHERE id = ?', [userId])
  2. Add input validation to ensure userId is a number
  3. Implement an ORM like Prisma or TypeORM that prevents SQL injection by default

Relevant Files: src/api/users.ts

**What**: AWS access keys are stored directly in the codebase and committed to version control, exposing full cloud infrastructure access

Risk: Anyone with repository access (including former employees or compromised accounts) could spin up expensive resources, access S3 buckets with customer data, or destroy production infrastructure

Potential Solutions:

  1. Immediately rotate the exposed credentials in AWS IAM
  2. Use environment variables and add .env to .gitignore
  3. Implement AWS Secrets Manager or similar vault solution
  4. Scan git history and purge the credentials using tools like git-filter-repo

Relevant Files: src/config/aws.ts, src/services/s3-uploader.ts

High Severity

**What**: Administrative API endpoints can be accessed without authentication, relying only on URL obscurity

Risk: An attacker who discovers these endpoints could modify user permissions, access sensitive reports, or change system configurations without credentials

Potential Solutions:

  1. Add authentication middleware to all /admin/* routes
  2. Implement role-based access control (RBAC) to verify admin permissions
  3. Add audit logging for all administrative actions
  4. Consider implementing rate limiting on admin endpoints

Relevant Files: src/api/admin/users.ts, src/api/admin/settings.ts

**What**: The application uses a hardcoded default JWT secret ("your-secret-key") for signing authentication tokens

Risk: Attackers can forge valid JWT tokens to impersonate any user, including administrators, granting them unauthorized access to user accounts and sensitive data

Potential Solutions:

  1. Generate a strong random secret: openssl rand -base64 32
  2. Store the secret in environment variables
  3. Rotate the JWT secret, which will invalidate all existing sessions
  4. Consider using RS256 (asymmetric) instead of HS256 for better security

Relevant Files: src/auth/jwt.ts

Low Severity

**What**: Production error responses include full stack traces and internal file paths that are sent to end users

Risk: Attackers can use this information to map your application structure, identify frameworks and versions, and find potential attack vectors more easily

Potential Solutions:

  1. Configure different error handlers for production vs development
  2. Log detailed errors server-side but send generic messages to clients
  3. Use an error handling middleware: if (process.env.NODE_ENV === 'production') { /* hide details */ }
  4. Implement centralized error logging with tools like Sentry

Relevant Files: src/middleware/error-handler.ts

**What**: The application doesn't set recommended security headers like `X-Frame-Options`, `X-Content-Type-Options`, and `Strict-Transport-Security`

Risk: Users may be vulnerable to clickjacking attacks, MIME-type sniffing, or man-in-the-middle attacks, though exploitation requires specific conditions

Potential Solutions:

  1. Use Helmet.js middleware: app.use(helmet())
  2. Configure headers manually in your web server (nginx/Apache) or application
  3. Set Content-Security-Policy to prevent XSS attacks
  4. Enable HSTS to enforce HTTPS connections

Relevant Files: src/app.ts, nginx.conf