Use constant-time comparison for bearer token validation #8
Labels
No Label
ai-changes-requested
ai-failed
ai-merged
ai-pr-opened
ai-reviewed
ai-reviewing
ai-reviewing
ai-working
bug
enhancement
evolution
performance
phase-0
phase-1a
phase-1b
phase-1c
phase-1d
security
tech-debt
todo
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cal/paper-dynasty-database#8
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
`app/dependencies.py:38` — `return token == AUTH_TOKEN`. Python string `==` short-circuits on first mismatch. Use `hmac.compare_digest()` instead.
Priority: low
Fixed in PR #56: #56
Added
import hmacand replacedtoken == AUTH_TOKENwithhmac.compare_digest(token, AUTH_TOKEN)inapp/dependencies.pyto prevent timing side-channel attacks on bearer token validation.