Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Authelia | 16,532 | 1 | 21 hours ago | 34 | September 19, 2022 | 97 | apache-2.0 | Go | ||
The Single Sign-On Multi-Factor portal for web apps | ||||||||||
Supercookie | 4,087 | a month ago | 12 | mit | HTML | |||||
⚠️ Browser fingerprinting via favicon! | ||||||||||
Arachni | 3,364 | 14 days ago | 134 | other | Ruby | |||||
Web Application Security Scanner Framework | ||||||||||
Secure_headers | 3,069 | 486 | 7 | 2 months ago | 107 | August 02, 2022 | 25 | mit | Ruby | |
Manages application of security headers with many safe defaults | ||||||||||
Sso | 2,981 | 5 months ago | 1 | July 06, 2021 | 87 | mit | Go | |||
sso, aka S.S.Octopus, aka octoboi, is a single sign-on solution for securing internal services | ||||||||||
Shynet | 2,417 | 5 days ago | 41 | apache-2.0 | Python | |||||
Modern, privacy-friendly, and detailed web analytics that works without cookies or JS. | ||||||||||
Subdomainizer | 1,535 | 16 days ago | 2 | mit | Python | |||||
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github. | ||||||||||
Csrf | 857 | 129 | 163 | 6 months ago | 14 | January 21, 2022 | 2 | bsd-3-clause | Go | |
gorilla/csrf provides Cross Site Request Forgery (CSRF) prevention middleware for Go web applications & services 🔒 | ||||||||||
Php Auth | 842 | 32 | 13 | a year ago | 38 | April 21, 2021 | 30 | mit | PHP | |
Authentication for PHP. Simple, lightweight and secure. | ||||||||||
Flask Talisman | 777 | 5 | 2 years ago | 1 | November 13, 2015 | 19 | apache-2.0 | Python | ||
HTTP security headers for Flask |
main branch represents 6.x line. See the upgrading to 4.x doc, upgrading to 5.x doc, or upgrading to 6.x doc for instructions on how to upgrade. Bug fixes should go in the 5.x branch for now.
The gem will automatically apply several headers that are related to security. This includes:
It can also mark all http cookies with the Secure, HttpOnly and SameSite attributes. This is on default but can be turned off by using config.cookies = SecureHeaders::OPT_OUT
.
secure_headers
is a library with a global config, per request overrides, and rack middleware that enables you customize your application settings.
If you do not supply a default
configuration, exceptions will be raised. If you would like to use a default configuration (which is fairly locked down), just call SecureHeaders::Configuration.default
without any arguments or block.
All nil
values will fallback to their default values. SecureHeaders::OPT_OUT
will disable the header entirely.
Word of caution: The following is not a default configuration per se. It serves as a sample implementation of the configuration. You should read more about these headers and determine what is appropriate for your requirements.
SecureHeaders::Configuration.default do |config|
config.cookies = {
secure: true, # mark all cookies as "Secure"
httponly: true, # mark all cookies as "HttpOnly"
samesite: {
lax: true # mark all cookies as SameSite=lax
}
}
# Add "; preload" and submit the site to hstspreload.org for best protection.
config.hsts = "max-age=#{1.week.to_i}"
config.x_frame_options = "DENY"
config.x_content_type_options = "nosniff"
config.x_xss_protection = "1; mode=block"
config.x_download_options = "noopen"
config.x_permitted_cross_domain_policies = "none"
config.referrer_policy = %w(origin-when-cross-origin strict-origin-when-cross-origin)
config.csp = {
# "meta" values. these will shape the header, but the values are not included in the header.
preserve_schemes: true, # default: false. Schemes are removed from host sources to save bytes and discourage mixed content.
disable_nonce_backwards_compatibility: true, # default: false. If false, `unsafe-inline` will be added automatically when using nonces. If true, it won't. See #403 for why you'd want this.
# directive values: these values will directly translate into source directives
default_src: %w('none'),
base_uri: %w('self'),
block_all_mixed_content: true, # see https://www.w3.org/TR/mixed-content/
child_src: %w('self'), # if child-src isn't supported, the value for frame-src will be set.
connect_src: %w(wss:),
font_src: %w('self' data:),
form_action: %w('self' github.com),
frame_ancestors: %w('none'),
img_src: %w(mycdn.com data:),
manifest_src: %w('self'),
media_src: %w(utoob.com),
object_src: %w('self'),
sandbox: true, # true and [] will set a maximally restrictive setting
plugin_types: %w(application/x-shockwave-flash),
script_src: %w('self'),
script_src_elem: %w('self'),
script_src_attr: %w('self'),
style_src: %w('unsafe-inline'),
style_src_elem: %w('unsafe-inline'),
style_src_attr: %w('unsafe-inline'),
worker_src: %w('self'),
upgrade_insecure_requests: true, # see https://www.w3.org/TR/upgrade-insecure-requests/
report_uri: %w(https://report-uri.io/example-csp)
}
# This is available only from 3.5.0; use the `report_only: true` setting for 3.4.1 and below.
config.csp_report_only = config.csp.merge({
img_src: %w(somewhereelse.com),
report_uri: %w(https://report-uri.io/example-csp-report-only)
})
end
All headers except for PublicKeyPins and ClearSiteData have a default value. The default set of headers is:
Content-Security-Policy: default-src 'self' https:; font-src 'self' https: data:; img-src 'self' https: data:; object-src 'none'; script-src https:; style-src 'self' https: 'unsafe-inline'
Strict-Transport-Security: max-age=631138519
X-Content-Type-Options: nosniff
X-Download-Options: noopen
X-Frame-Options: sameorigin
X-Permitted-Cross-Domain-Policies: none
X-Xss-Protection: 1; mode=block
Which headers you decide to use for API responses is entirely a personal choice. Things like X-Frame-Options seem to have no place in an API response and would be wasting bytes. While this is true, browsers can do funky things with non-html responses. At the minimum, we suggest CSP:
SecureHeaders::Configuration.override(:api) do |config|
config.csp = { default_src: 'none' }
config.hsts = SecureHeaders::OPT_OUT
config.x_frame_options = SecureHeaders::OPT_OUT
config.x_content_type_options = SecureHeaders::OPT_OUT
config.x_xss_protection = SecureHeaders::OPT_OUT
config.x_permitted_cross_domain_policies = SecureHeaders::OPT_OUT
end
However, I would consider these headers anyways depending on your load and bandwidth requirements.
This project originated within the Security team at Twitter. An archived fork from the point of transition is here: twitter-archive/secure_headers.
Contributors include:
If you've made a contribution and see your name missing from the list, make a PR and add it!