You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 18, 2023. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,15 +128,15 @@ Please fill out this section with details relevant to your team.
128
128
129
129
#### Question 1: Briefly describe the web technology stack used in your implementation.
130
130
131
-
The web framework is written in Python Flask that connects to a MongoDB database and the web server is hosted on Apache.
131
+
The web app is written on Python Flask framework that connects to a MongoDB database and the frontend web server is hosted on Apache.
132
132
The frontend is designed using HTML, Bootstrap 4 and JavaScript (jQuery 3.3.1).
133
133
134
134
#### Question 2: Are there any security considerations your team thought about?
135
135
136
136
We had identified the following security considerations, however it had been stated in the assignment brief that there is no need to implement the actual security measures to counter these issues.
137
137
138
138
Implemented:
139
-
- Password hashing using bcrypt
139
+
- Password salted-hashing using bcrypt
140
140
- Client-side XSS sanitisation using DOMPurify
141
141
142
142
Considered but not implemented:
@@ -160,26 +160,30 @@ One potential weakness is in the cookie management - currently we are still usin
160
160
161
161
Another vulnerability is the lack of SSL. Due to that, all web traffic is sent / received in the clear, allowing all kinds of MITM attacks to occur.
162
162
163
-
Our usage of DOMPurify provides client-side sanitisation for our web app. However, it is not a foolproof way. For a more rigorous defense, server-side sanitisation should be employed as well.
163
+
Our usage of DOMPurify provides client-side sanitisation for our web app. However, it is not a foolproof way. For a more rigorous defense (e.g. against persistent XSS), server-side sanitisation should be employed as well.
164
164
165
165
#### Feedback: Is there any other feedback you would like to give?
166
166
167
167
Logging should be done on the server-side to track all the significant actions made by all the users of the web app.
168
+
A framework/tool we could use to test our final webapp would be really appreciated.
169
+
The API should also consider RESTful features like: correct http verbs for end-points (GET for idempotent, resource-info-acquiring end-points, DELETE for resource deletion...), response status codes that make more sense (4xx for client-side errors), maybe a header instead of a field for the auth token...
168
170
169
171
### Declaration
170
172
171
173
#### Please declare your individual contributions to the assignment:
0 commit comments