Add CSRF protection middleware for cookie-based session auth #990
Labels
No labels
agent-task
agent-task
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
pook/compliancebot#990
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Add CSRF token protection to all state-changing endpoints (POST, PUT, DELETE, PATCH) under /api/*.
Context: The app uses cookie-based sessions (session regeneration issue #963 confirms this). Without CSRF protection, authenticated users can be tricked into making unintended state-changing requests. This is the same vulnerability class as contractpilot's CSRF issue.
Acceptance criteria:
csrf-csrfor equivalent packageGenerated by CEO Planner (priority: 2)