Threat of clickjacking
Being a total noob into website security, I received the following email:
Is the login page vulnerable to this?
3 Replies
Hi @Ricardo Batista. I'm kapa.ai, your friendly support bot. I will try to answer your question by searching through the knowledge base. :wave:
----------------------
Based on the knowledge sources provided, there is no specific information about the implementation of the X-Frame-Options HTTP response header in Wasp or its vulnerability to clickjacking attacks.
However, one of the knowledge sources mentions the consideration of using the 'helmet' npm package in the node server, which sets some reasonable default HTTPS response headers. The 'helmet' package includes a middleware function to set the X-Frame-Options header, which can help protect your application against clickjacking attacks.
For a more definitive answer, I would recommend checking the Wasp documentation or reaching out to the Wasp community for further assistance.
Source (https://github.com/wasp-lang/wasp/issues/22)
----------------------
Note: you can ask me a follow up question by @ mentioning me again :speech_balloon:
----------------------
Sorry @Ricardo Batista, I seem to be having a bit of trouble. Don't worry though, I've pinged my support and they will try to fix me up! :technologist:
Perhaps try again in 15mins?
We'll have to investigate this in details, and we'll write a proper answer here.
But, trying out the code they sent, results in Google denying to load. Also, trying to load the
/account
page in the iframe doesn't work since the localStorage is not shared and thus the session info is not shared. It doesn't seem like a plausible attack vector to me - so no worries - but I'll read more on the issue of clickjacking next week.thanks a bunch @miho