Skip to content

Commit 6433639

Browse files
authored
Merge pull request #3 from carlmlane/master
spell check on security checklist
2 parents 431ca52 + d1f714e commit 6433639

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

security-checklist.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
- [ ] Use HTTPS everywhere.
88
- [ ] Store password hashes using `Bcrypt` with a random `salt`.
99
- [ ] Destroy the session identifier after `logout`.
10-
- [ ] Destory all active sessions on reset password (or offer to).
10+
- [ ] Destroy all active sessions on reset password (or offer to).
1111
- [ ] Must have the `state` parameter in OAuth2
1212
- [ ] No open redirects after successful login or in any other intermediate redirects.
1313
- [ ] When parsing Signup/Login input, sanitize for javascript://, data://, CRLF characters.
@@ -30,7 +30,7 @@
3030
- [ ] [JWT](https://jwt.io/) are awesome. Use them if required for your single page app/APIs.
3131

3232

33-
##### ANDRIOD / IOS APP
33+
##### ANDROID / IOS APP
3434
- [ ] `salt` from payment gateways should not be hardcoded.
3535
- [ ] `secret` / `auth token` from 3rd party SDK's should not be hardcoded.
3636
- [ ] API calls intended to be done `server to server` should not be done from the App.
@@ -46,15 +46,15 @@
4646
- [ ] `Add` [X-XSS-Protection](https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#X-XSS-Protection) header to mitigate XSS attacks.
4747
- [ ] Update DNS records to add [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) record to mitigate spam and phishing attacks.
4848
- [ ] Add [subresource integrity checks](https://en.wikipedia.org/wiki/Subresource_Integrity) if loading your JavaScript libraries from a third party CDN.
49-
- [ ] Use random CSRF tokens and expose buisness logic APIs as HTTP POST requests. Do not expose CSRF tokens over HTTP for example in a inital request upgrade phase.
49+
- [ ] Use random CSRF tokens and expose business logic APIs as HTTP POST requests. Do not expose CSRF tokens over HTTP for example in an initial request upgrade phase.
5050
- [ ] Do not use critical data or tokens in GET request parameters. Exposure of server logs or a machine/stack processing them would expose user data in turn.
5151

5252
##### SANITIZATION OF INPUT
5353
- [ ] `Sanitize` all user inputs or any input parameters exposed to user to prevent [XSS](https://en.wikipedia.org/wiki/Cross-site_scripting)
5454
- [ ] `Sanitize` all user inputs or any input parameters exposed to user to prevent [SQL Injection](https://en.wikipedia.org/wiki/SQL_injection)
55-
- [ ] Sanitize user input if using it directly for functionalites like CSV import.
55+
- [ ] Sanitize user input if using it directly for functionalities like CSV import.
5656
- [ ] `Sanitize` user input for special cases like robots.txt as profile names in case you are using a url pattern like coolcorp.io/username.
57-
- [ ] Do not hand code or build JSON by string concatentation ever, no matter how small the object is. Use your langauge defined libraries or framework.
57+
- [ ] Do not hand code or build JSON by string concatenation ever, no matter how small the object is. Use your langauge defined libraries or framework.
5858
- [ ] Sanitize inputs that take some sort of URLs to prevent [SSRF](https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit#heading=h.t4tsk5ixehdd).
5959
- [ ] Sanitize Outputs before displaying to users.
6060

0 commit comments

Comments
 (0)