Skip to content

Conversation

@prasunsrivastav123-lang
Copy link

This PR clarifies same-site CSRF risks arising from user-generated content.

It explains scenarios where SameSite cookies alone are insufficient and
reinforces the need for CSRF tokens and proper request handling.

Copy link
Member

@jmanico jmanico left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is technically not CSRF but XSS. But I still discuss this issue. I noticed the formatting of your markdown is different then the rest of the doc. Can you make it more consistent?

@prasunsrivastav123-lang
Copy link
Author

Thanks for the clarification — agreed that this scenario is technically XSS-enabled. I’ve updated the section to acknowledge that explicitly, kept it framed in the context of CSRF defense limitations, and adjusted the markdown structure and wording to be consistent with the rest of the document.

@nickchomey
Copy link
Contributor

As i pointed out (and rejected) in #1936, this PR is largely irrelevant nonsense. I urge you to close it and give serious consideration to #1952

@szh szh closed this Jan 7, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants