fix(security): harden file access controls, webhook auth, and input bounds#4601
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub. |
PR SummaryMedium Risk Overview Behavior and robustness tweaks. Webhook providers remove overly-detailed signature-failure debug metadata and WhatsApp token verification now uses Logs UI/filters improvements. Date range picking gains optional time selection ( Reviewed by Cursor Bugbot for commit af63a74. Configure here. |
Greptile SummaryThis PR is a broad security hardening pass across the Sim application, adding file-access authorization checks to ~30 tool routes, tightening webhook signature validation, fixing a parameterized JSONB binding, replacing
Confidence Score: 5/5Safe to merge; the authorization changes are consistent and correct across all affected routes. All the core security changes — file access guards, parallel access checks before downloads, timing-safe webhook comparisons, and the JSONB parameterized binding — are implemented correctly. The Teams and Slack sequential loops expose a minor resource-leak edge case (earlier uploads orphaned if a later file is denied), but this does not grant any unauthorised access and every route still returns the correct 404. No data corruption or auth bypass paths were found. apps/sim/tools/microsoft_teams/server-utils.ts and apps/sim/app/api/tools/slack/utils.ts — the sequential per-file loop means files already uploaded to OneDrive or Slack can be left orphaned if a later file fails the access check. Important Files Changed
Reviews (4): Last reviewed commit: "remove tooltip from resource tabs" | Re-trigger Greptile |
|
@greptile |
|
@cursor review |
|
@greptile |
|
@cursor review |
There was a problem hiding this comment.
✅ Bugbot reviewed your changes and found no new issues!
Comment @cursor review or bugbot run to trigger another review on this PR
Reviewed by Cursor Bugbot for commit a0b1073. Configure here.
|
@greptile |
|
@cursor review |
There was a problem hiding this comment.
✅ Bugbot reviewed your changes and found no new issues!
Comment @cursor review or bugbot run to trigger another review on this PR
Reviewed by Cursor Bugbot for commit af63a74. Configure here.
Summary
const userIdreplaceAllso all occurrences in a message body are substituted, not just the firstmaxSizewith explicit min/max bounds on the Zod schemaType of Change
Testing
Tested manually
Checklist