You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Aug 23, 2021. It is now read-only.
Currently, in the Dashboard we are storing the token in local storage. This helps prevent CSRF attacks, but with XSS, one could scrape localstorage on the client-side and steal our token.
I'm up for suggestions, but I'm wondering if we can proxy the code-exchange through a hosted function so we can create the token serverside (as http-only).
To mitigate CSRF, the token could be created as Same-site strict, or use something similar to our CSRF workaround in the Next-Github solution.
TODO:
Implement some backend helpers for the CSRF Token approach
Implement an in-memory approach, and make it the default (As recommended by both Auth0 and Cognito's clients)
Make the token storage configurable by a key within the ForestryClient props
The text was updated successfully, but these errors were encountered:
Currently, in the Dashboard we are storing the token in local storage. This helps prevent CSRF attacks, but with XSS, one could scrape localstorage on the client-side and steal our token.
I'm up for suggestions, but I'm wondering if we can proxy the code-exchange through a hosted function so we can create the token serverside (as http-only).
To mitigate CSRF, the token could be created as Same-site strict, or use something similar to our CSRF workaround in the Next-Github solution.
TODO:
The text was updated successfully, but these errors were encountered: