TODOs: - [x] Add documentation - [x] e2e tests: run security review, update knowledge, and fix issue - [x] more stringent risk rating <!-- CURSOR_SUMMARY --> --- > [!NOTE] > Introduces a new Security mode with a Security Review panel that runs reviews, edits rules, parses findings via IPC, and supports fixing issues, with tests and prompt/runtime support. > > - **UI/Preview Panel**: > - Add `security` preview mode to `previewModeAtom` and ActionHeader (Shield button). > - New `SecurityPanel` showing findings table (sorted by severity), run review, fix issue flow, and edit `SECURITY_RULES.md` dialog. > - Wire into `PreviewPanel` content switch. > - **Hooks**: > - `useSecurityReview(appId)`: fetch latest review via IPC. > - `useStreamChat`: add `onSettled` callback to invoke refreshes after streams. > - **IPC/Main**: > - `security_handlers`: `get-latest-security-review` parses `<dyad-security-finding>` from latest assistant message. > - Register handler in `ipc_host`; expose channel in `preload`. > - `ipc_client`: add `getLatestSecurityReview(appId)`. > - `chat_stream_handlers`: detect `/security-review`, use dedicated system prompt, optionally append `SECURITY_RULES.md`, suppress Supabase-not-available note in this mode. > - **Prompts**: > - Add `SECURITY_REVIEW_SYSTEM_PROMPT` with structured finding output. > - **Supabase**: > - Enhance schema query to include `rls_enabled`, split policy `using_clause`/`with_check_clause`. > - **E2E Tests**: > - New `security_review.spec.ts` plus snapshots and fixture findings; update test helper for `security` mode and findings table snapshot. > - Fake LLM server streams security findings for `/security-review` and increases batch size. > > <sup>Written by [Cursor Bugbot](https://cursor.com/dashboard?tab=bugbot) for commit 5022d01e22a2dd929a968eeba0da592e0aeece01. This will update automatically on new commits. Configure [here](https://cursor.com/dashboard?tab=bugbot).</sup> <!-- /CURSOR_SUMMARY -->
6.1 KiB
OK, let's review the security.
Here are variations with different severity levels.
Purposefully putting medium on top to make sure the severity levels are sorted correctly.
Medium Severity
**What**: The file upload endpoint accepts any file type without validating extensions or content, only checking file sizeRisk: An attacker could upload malicious files (e.g., .exe, .php) that might be executed if the server is misconfigured, or upload extremely large files to consume storage space
Potential Solutions:
- Implement a whitelist of allowed file extensions (e.g.,
.jpg,.png,.pdf) - Validate file content type using magic numbers, not just the extension
- Store uploaded files outside the web root with random filenames
- Implement virus scanning for uploaded files using ClamAV or similar
Relevant Files: src/api/upload.ts
Risk: An attacker could trick authenticated users into unknowingly performing actions like changing their email, making purchases, or deleting data by visiting a malicious website
Potential Solutions:
- Implement CSRF tokens using a library like
csurffor Express - Set
SameSite=StrictorSameSite=Laxon session cookies - Verify the
OriginorRefererheader for sensitive operations - For API-only applications, consider using custom headers that browsers can't set cross-origin
Relevant Files: src/middleware/auth.ts, src/api/*.ts
Critical Severity
**What**: User input flows directly into database queries without validation, allowing attackers to execute arbitrary SQL commandsRisk: An attacker could steal all customer data, delete your entire database, or take over admin accounts by manipulating the URL
Potential Solutions:
- Use parameterized queries:
db.query('SELECT * FROM users WHERE id = ?', [userId]) - Add input validation to ensure
userIdis a number - Implement an ORM like Prisma or TypeORM that prevents SQL injection by default
Relevant Files: src/api/users.ts
Risk: Anyone with repository access (including former employees or compromised accounts) could spin up expensive resources, access S3 buckets with customer data, or destroy production infrastructure
Potential Solutions:
- Immediately rotate the exposed credentials in AWS IAM
- Use environment variables and add
.envto.gitignore - Implement AWS Secrets Manager or similar vault solution
- Scan git history and purge the credentials using tools like
git-filter-repo
Relevant Files: src/config/aws.ts, src/services/s3-uploader.ts
High Severity
**What**: Administrative API endpoints can be accessed without authentication, relying only on URL obscurityRisk: An attacker who discovers these endpoints could modify user permissions, access sensitive reports, or change system configurations without credentials
Potential Solutions:
- Add authentication middleware to all
/admin/*routes - Implement role-based access control (RBAC) to verify admin permissions
- Add audit logging for all administrative actions
- Consider implementing rate limiting on admin endpoints
Relevant Files: src/api/admin/users.ts, src/api/admin/settings.ts
Risk: Attackers can forge valid JWT tokens to impersonate any user, including administrators, granting them unauthorized access to user accounts and sensitive data
Potential Solutions:
- Generate a strong random secret:
openssl rand -base64 32 - Store the secret in environment variables
- Rotate the JWT secret, which will invalidate all existing sessions
- Consider using RS256 (asymmetric) instead of HS256 for better security
Relevant Files: src/auth/jwt.ts
Low Severity
**What**: Production error responses include full stack traces and internal file paths that are sent to end usersRisk: Attackers can use this information to map your application structure, identify frameworks and versions, and find potential attack vectors more easily
Potential Solutions:
- Configure different error handlers for production vs development
- Log detailed errors server-side but send generic messages to clients
- Use an error handling middleware:
if (process.env.NODE_ENV === 'production') { /* hide details */ } - Implement centralized error logging with tools like Sentry
Relevant Files: src/middleware/error-handler.ts
Risk: Users may be vulnerable to clickjacking attacks, MIME-type sniffing, or man-in-the-middle attacks, though exploitation requires specific conditions
Potential Solutions:
- Use Helmet.js middleware:
app.use(helmet()) - Configure headers manually in your web server (nginx/Apache) or application
- Set
Content-Security-Policyto prevent XSS attacks - Enable HSTS to enforce HTTPS connections
Relevant Files: src/app.ts, nginx.conf