Hash deleteToken and authorToken in the database #4

Open
opened 2025-08-25 01:43:11 +02:00 by VityaSchel · 0 comments
VityaSchel commented 2025-08-25 01:43:11 +02:00 (Migrated from github.com)

In case of database leak or readonly breach, an attacker could steal delete tokens and erase pages via API. Hashing this value would allow the backend to find matches in the database and attacker would not be able to use API to send delete requests.

In case of database leak or readonly breach, an attacker could steal delete tokens and erase pages via API. Hashing this value would allow the backend to find matches in the database and attacker would not be able to use API to send delete requests.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: hloth/lufin#4
No description provided.