🔴 [P0] Implement CSRF protection on state-changing endpoints #278

Closed
opened 2026-02-03 22:29:43 +00:00 by jason.woltje · 0 comments
Owner

Summary

No CSRF protection configured. All POST/PATCH/DELETE endpoints vulnerable to CSRF attacks.

Security Impact

  • CSRF on connection initiation
  • CSRF on connection acceptance
  • CSRF on agent spawn
  • CSRF on identity linking

Required Implementation

  1. Install csurf middleware
  2. Configure CSRF tokens
  3. Exempt signature-based endpoints
  4. Add tokens to forms

Priority

CRITICAL (P0) - CSRF vulnerability

## Summary No CSRF protection configured. All POST/PATCH/DELETE endpoints vulnerable to CSRF attacks. ## Security Impact - CSRF on connection initiation - CSRF on connection acceptance - CSRF on agent spawn - CSRF on identity linking ## Required Implementation 1. Install `csurf` middleware 2. Configure CSRF tokens 3. Exempt signature-based endpoints 4. Add tokens to forms ## Priority **CRITICAL (P0)** - CSRF vulnerability
jason.woltje added the securityp0web labels 2026-02-03 22:29:43 +00:00
jason.woltje added this to the M7.1-Remediation (0.0.8) milestone 2026-02-03 22:31:44 +00:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: mosaic/stack#278