-
-
Notifications
You must be signed in to change notification settings - Fork 0
feat: Additional Security Enhancements (Issue #365) [main] #437
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
feat: add API-Friendly security header preset for mobile apps
- Add constant-time token comparison utility (crypto/subtle) - Add SBOM generation and attestation to CI/CD pipeline - Document TLS enforcement, DNS security (DoH/DoT), and container hardening - Create Security Incident Response Plan (SIRP) - Add security update notification documentation Security enhancements: - Mitigates timing attacks on invite token validation - Provides supply chain transparency with CycloneDX SBOM - Documents production container hardening (read_only, cap_drop) Closes #365
…urity docs: add planning document for Issue #365 Additional Security
Feature/beta release
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
…on-44.x chore(deps): update renovatebot/github-action action to v44.2.1
…ip2-golang-v2-2.x fix(deps): update module github.com/oschwald/geoip2-golang/v2 to v2.1.0
chore(deps): update npm minor/patch
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR implements additional security enhancements for Issue #365, addressing timing attacks, supply chain security, and improving security documentation. The changes focus on defense-in-depth measures including constant-time token comparison, SBOM generation for supply chain transparency, and comprehensive security documentation covering TLS, DNS, container hardening, and incident response procedures.
Key Changes
- Timing Attack Mitigation: Added constant-time comparison utility for sensitive token validation
- Supply Chain Security: Implemented SBOM generation and attestation in CI/CD pipeline
- Documentation: Added TLS/DNS security sections, container hardening guide, and complete Security Incident Response Plan
Reviewed changes
Copilot reviewed 20 out of 23 changed files in this pull request and generated 6 comments.
Show a summary per file
| File | Description |
|---|---|
| frontend/package.json | Minor dependency updates (react-hook-form 7.68.0→7.69.0, knip 5.75.1→5.76.2) |
| frontend/package-lock.json | Lockfile updates corresponding to package.json changes |
| backend/internal/util/crypto.go | New constant-time comparison utilities using crypto/subtle |
| backend/internal/util/crypto_test.go | Comprehensive tests and benchmarks for crypto utilities |
| backend/internal/api/handlers/user_handler.go | Applied constant-time token comparison in AcceptInvite endpoint |
| docs/security.md | Added TLS enforcement, DNS security, and container hardening sections |
| docs/security-incident-response.md | New comprehensive SIRP document with incident classification and procedures |
| docs/getting-started.md | Added security update notification guidance (Watchtower, Diun, GitHub Watch) |
| docs/reports/qa_report.md | Updated QA report for Issue #365 with test results and coverage metrics |
| docs/plans/issue-365-additional-security.md | Planning document outlining security enhancement phases |
| docs/plans/current_spec.md | Implementation specification with detailed analysis |
| docs/issues/issue-365-manual-test-plan.md | Manual testing procedures for security enhancements |
| .github/workflows/docker-build.yml | Added SBOM generation and attestation steps with required permissions |
| .github/workflows/waf-integration.yml | Updated docker/setup-buildx-action to v3.12.0 |
| .github/workflows/security-weekly-rebuild.yml | Updated docker/setup-buildx-action to v3.12.0 |
| .github/workflows/docs-to-issues.yml | Changed dry_run default from string 'false' to boolean false |
| .github/agents/QA_Security.agent.md | Updated testing instructions and severity requirements |
| .github/agents/Manegment.agent.md | Added manual testing plan creation to closure phase |
| .gitignore | Added sbom*.json to ignored files |
| .dockerignore | Added sbom*.json to ignored files |
Files not reviewed (1)
- frontend/package-lock.json: Language not supported
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Summary
Implements additional security enhancements as outlined in Issue #365.
Security Threats Addressed
High Priority
Medium Priority
Documentation Updates
Future Considerations (Out of Scope)
Related Issues
Closes #365
Checklist