Skip to content

Commit

Permalink
Add docs from gofiber/fiber@60967f5
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Mar 28, 2024
1 parent ae227f0 commit d23d99b
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion docs/core/api/app.md
Original file line number Diff line number Diff line change
Expand Up @@ -664,4 +664,4 @@ Hooks is a method to return [hooks](../guide/hooks.md) property.

```go title="Signature"
func (app *App) Hooks() *Hooks
```
```
2 changes: 1 addition & 1 deletion docs/core/api/middleware/cors.md
Original file line number Diff line number Diff line change
Expand Up @@ -214,4 +214,4 @@ When configuring CORS, misconfiguration can potentially expose your application

- **Inadequate `AllowOriginsFunc` Validation**: When using `AllowOriginsFunc` for dynamic origin validation, ensure the function includes robust checks to prevent unauthorized origins from being accepted. Overly permissive validation can lead to security vulnerabilities. Never allow `AllowOriginsFunc` to return `true` for all origins. This is particularly crucial when `AllowCredentials` is set to `true`. Doing so can bypass the restriction of using a wildcard origin with credentials, exposing your application to serious security threats. If you need to allow wildcard origins, use `AllowOrigins` with a wildcard `"*"` instead of `AllowOriginsFunc`.

Remember, the key to secure CORS configuration is specificity and caution. By carefully selecting which origins, methods, and headers are allowed, you can help protect your application from cross-origin attacks.
Remember, the key to secure CORS configuration is specificity and caution. By carefully selecting which origins, methods, and headers are allowed, you can help protect your application from cross-origin attacks.

0 comments on commit d23d99b

Please sign in to comment.