Some checks are pending
Go Benchmark / Performance Regression Check (push) Waiting to run
Cerberus Integration / Cerberus Security Stack Integration (push) Waiting to run
Upload Coverage to Codecov / Backend Codecov Upload (push) Waiting to run
Upload Coverage to Codecov / Frontend Codecov Upload (push) Waiting to run
CodeQL - Analyze / CodeQL analysis (go) (push) Waiting to run
CodeQL - Analyze / CodeQL analysis (javascript-typescript) (push) Waiting to run
CrowdSec Integration / CrowdSec Bouncer Integration (push) Waiting to run
Docker Build, Publish & Test / build-and-push (push) Waiting to run
Docker Build, Publish & Test / Security Scan PR Image (push) Blocked by required conditions
Quality Checks / Auth Route Protection Contract (push) Waiting to run
Quality Checks / Codecov Trigger/Comment Parity Guard (push) Waiting to run
Quality Checks / Backend (Go) (push) Waiting to run
Quality Checks / Frontend (React) (push) Waiting to run
Rate Limit integration / Rate Limiting Integration (push) Waiting to run
Security Scan (PR) / Trivy Binary Scan (push) Waiting to run
Supply Chain Verification (PR) / Verify Supply Chain (push) Waiting to run
WAF integration / Coraza WAF Integration (push) Waiting to run
2.1 KiB
Executable File
2.1 KiB
Executable File
Additional Security Threats to Consider
1. Supply Chain Attacks
- Threat: Compromised Docker images, npm packages, Go modules
- Current Protection: ❌ None
- Recommendation: Add Trivy scanning (already in CI) + SBOM generation
2. DNS Hijacking / Cache Poisoning
- Threat: Attacker redirects DNS queries to malicious servers
- Current Protection: ❌ None (relies on system DNS resolver)
- Recommendation: Document use of encrypted DNS (DoH/DoT) in deployment guide
3. TLS Downgrade Attacks
- Threat: Force clients to use weak TLS versions
- Current Protection: ✅ Caddy enforces TLS 1.2+ by default
- Recommendation: Document minimum TLS version in security.md
4. Certificate Transparency (CT) Log Poisoning
- Threat: Attacker registers fraudulent certs for your domains
- Current Protection: ❌ None
- Recommendation: Add CT log monitoring (future feature)
5. Privilege Escalation (Container Escape)
- Threat: Attacker escapes Docker container to host OS
- Current Protection: ⚠️ Partial (Docker security best practices)
- Recommendation: Document running with least-privilege, read-only root filesystem
6. Session Hijacking / Cookie Theft
- Threat: Steal user session tokens via XSS or network sniffing
- Current Protection: ✅ HTTPOnly cookies, Secure flag, SameSite (verify implementation)
- Recommendation: Add CSP (Content Security Policy) headers
7. Timing Attacks (Cryptographic Side-Channel)
- Threat: Infer secrets by measuring response times
- Current Protection: ❌ Unknown (need bcrypt timing audit)
- Recommendation: Use constant-time comparison for tokens
Enterprise-Level Security Gaps:
- Missing: Security Incident Response Plan (SIRP)
- Missing: Automated security update notifications
- Missing: Multi-factor authentication (MFA) for admin accounts (Use Authentik via built in. No extra external containers. Consider adding SSO as well just for Charon. These are not meant to pass auth to Proxy Hosts. Charon is a reverse proxy, not a secure dashboard.)
- Missing: Audit logging for compliance (GDPR, SOC 2)