Security: API authentication & rate-limiting #329
Labels
No labels
auto-merged
ci
failed
component
api
good first issue
has-pr
help wanted
idea
priority
critical
priority
high
priority
low
priority
medium
review
approved
review
commented
status
blocked
status
in-progress
status
needs-review
status
ready
type
bug
type
chore
type
docs
type
enhancement
type
feature
type
refactor
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
customable/claude-mem#329
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Problem
Backend-API ist aktuell ohne Authentication → jeder kann API-Calls machen.
Risiken:
Gewünschte Sicherheitsmaßnahmen
1. API-Key Authentication
2. Rate-Limiting
Already implemented with multiple tiers (standard, expensive, search, admin, worker spawn, speed limiter).
3. CORS-Protection
Configurable via
CORS_ORIGINSsetting.4. Input-Validation (Zod)
Zod schemas for hooks routes (session start/end, prompt, observation, user tasks).
5. Helmet.js (Security Headers)
Added with CSP, X-Frame-Options, X-Content-Type-Options.
Acceptance Criteria
Priority
High - Kritisch für Production-Deployment.
Related
Token-Storage-Verschlüsselung und Audit-Log werden in separaten Issues behandelt.