Skip to content

Conversation

@jsperezg
Copy link
Contributor

Reason for change

Closes # .

List of Changes

  • Describe your changes as a concise list of items.
  • This should be more informative than the diff itself.

Checklist

  • I have updated necessary documentation and links in the README.md or the doc folder
  • I have rebased from main, written good commit messages and squashed unnecessary commits

@jsperezg jsperezg requested a review from xredo November 17, 2025 14:57
Copy link
Member

@xredo xredo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have left some comments to provide more information and context to some of the topics covered in the changes.

The rest is great!


[Snyk](https://snyk.io/) is one such tool. It is cross-platform and allows detecting vulnerabilities in several language runtimes, in Docker images, Infrastructure-as-Code definitions, and Open Source dependencies.

We will also check the dependency scanner built in GitHub or GitLab.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As we don't use Gitlab, we can leave just Github and offer more details. Those are the official instructions to enable dependabot in Github projects:
https://docs.github.com/en/code-security/getting-started/dependabot-quickstart-guide

Comment on lines +41 to +45
- Tools or lint rules should flag:
- Any usage of dangerouslySetInnerHTML without sanitization
- Dynamic calls to child_process
- Dynamic require() using untrusted data
- Unvalidated users or session access
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Currently we are using ESLint for our projects. So we can mention specific rules that we can use to enforce this:

  • Any usage of dangerouslySetInnerHTML without sanitization: eslint-plugin-react has react/no-danger
  • Dynamic calls to child_process: eslint-plugin-security has security/detect-child-process
  • Dynamic require(): eslint-plugin-import: import/no-dynamic-require
  • Unvalidated users or session access: I don't know any ESLint rule for this. I don't iknow if we can force this.

Comment on lines +50 to +52
- _docker scan_ or platform-provided scanners
- Snyk container scanning
- Make sure the containers are built on top of OS images that are still supported and receiving security upgrades.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

Comment on lines +120 to +123
## Logging, Monitoring & Alerts

Check that:

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All good 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants