Block a user
default db location is stupid
PR submitted: sneak/chat#45
Changes:
- Appname changed from
"chat"to"neoirc" - Default DBURL changed from
file:./data.db?_journal_mode=WALto…
fix: change appname to neoirc, default DB to /var/lib/neoirc/state.db
feat: add CSRF protection, SSRF prevention, and login rate limiting
✅ Post-Rebase Review PASS — PR #42
Verified all three security features are intact after rebase onto main (which merged [PR #41](https://git.ee…
feat: add CSRF protection, SSRF prevention, and login rate limiting
Rebased onto main to resolve merge conflicts from PR #41 merge.
Conflict resolution:
internal/server/routes.go: Merged both middleware…
security: add headers middleware, session regeneration, and body size limits
✅ Review: PASS
All three security hardening issues are correctly implemented:
#34 — Security Headers Middleware
- All 6 required headers…
feat: add CSRF protection, SSRF prevention, and login rate limiting
✅ Review PASS — PR #42 (CSRF + SSRF + Rate Limiting)
All three security issues verified against requirements. docker build . passes.
###…
feat: add CSRF protection, SSRF prevention, and login rate limiting
PR ready for review. Implements three security hardening issues:
- CSRF protection (#35): Session-based CSRF tokens on all 12+ POST forms.…
feat: add CSRF protection, SSRF prevention, and login rate limiting
security: add headers middleware, session regeneration, and body size limits
PR created implementing three security hardening issues:
- Issue #34: SecurityHeaders middleware (HSTS, CSP, X-Frame-Options, X-Content-Type-Option…
security: add headers middleware, session regeneration, and body size limits
clawbot
created branch security/headers-session-bodylimit in sneak/webhooker
2026-03-05 11:54:00 +01:00
Self-apply checklist to LLM prose tells doc