Skip to content

security: helmet, error sanitization, request IDs, npm audit#30

Merged
Pyronewbic merged 1 commit intomainfrom
dev
May 10, 2026
Merged

security: helmet, error sanitization, request IDs, npm audit#30
Pyronewbic merged 1 commit intomainfrom
dev

Conversation

@Pyronewbic
Copy link
Copy Markdown
Owner

Summary

  • Helmet security headers (X-Frame-Options, HSTS, X-Content-Type-Options)
  • Error responses sanitized — no internal paths, credentials, or Firestore details leak to clients
  • Request ID (X-Request-Id) on every response for error tracing
  • trust proxy enabled for correct client IP behind Cloud Run LB
  • npm audit: 0 vulnerabilities (was 2 moderate)
  • GitHub Actions bumped to v5/v3 (Node 24 compatible)

Manual verification

  • Security headers present in response (check with curl -I)
  • Error responses don't leak internals

…udit

- Helmet security headers (X-Frame-Options, HSTS, etc.)
- Error responses sanitized: no internal paths, credentials, or Firestore details
- Request ID on every response (X-Request-Id) for error tracing
- trust proxy for correct client IP behind Cloud Run LB
- npm audit: 0 vulnerabilities
- GitHub Actions bumped to v5/v3 (Node 24 compatible)
@Pyronewbic Pyronewbic merged commit f845584 into main May 10, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant