Security fixes... pretty much everywhere this week

avatar
(Edited)

If you are interested in user facing changes you can probably skip this post and read the previous one here.

This post is mostly technical and focused on security related work on multiple PeakD + Peak Open repositories: XSS, CSP, SSRF, regex safety, and API abuse guardrails.

image.png

Also, huge thanks (and some rewards from this post) to @louis88 for the help on this hardening round. If you want to support his work as a security experts on Hive check out his subscriptions page: https://peakd.com/@louis88/shop.

PeakD

Most of the security work this week happened here, mostly around browser-side protections and safer content loading.

Nice side effect of this round: peakd.com now shows an A+ on SecurityHeaders (up from the A score we had since day 1): https://securityheaders.com/?q=peakd.com&followRedirects=on

image.png

What changed:

- Tightened what external images the browser is allowed to load to enforce strict privacy when loading images from un-trusted sources
- Reduced overly broad defaults and moved to a stricter allowlist approach
- Improved script-loading protection so each page request gets a fresh safety token
- Applied stricter rules to API endpoints and static resources
- Tuned PWA and service worker behavior so it stays aligned with the same security posture

Net effect: stricter defaults, cleaner policy behavior, and stronger protection against content injection issues.

Peak Image Proxy

Repo: https://gitlab.com/peakd/peak-image-proxy

This one got a solid hardening pass focused on network exposure and input validation.

What changed:

- Added stronger safeguards to block risky internal-network fetch attempts
- Tightened how incoming image URLs are parsed and validated
- Switched cross-origin access to a clear allowlist model
- Reduced operational details exposed by health/status responses
- Hardened accepted file-type handling for image processing
- Upgraded hashing used in cache keys to a stronger standard

This is a meaningful improvement for both SSRF risk and general attack surface minimization.

Peak Notification System

Repo: https://gitlab.com/peakd/peak-notification-system

Here the focus was on regex safety and API boundary limits.

What changed:

- Added safety checks for regex-based rules to avoid abusive patterns
- Added size limits to reduce risk from expensive pattern matching
- Improved handling so repeated checks are cheaper and more predictable
- Enforced stricter pagination limits to prevent heavy or abusive API queries

The regex hardening is especially important because account-level config can otherwise become a performance/security footgun very quickly.

Sting Message (frontend v2)

Repo: https://gitlab.com/peakd/sting-message-frontend

Main fix here was tightening link handling to reduce XSS injection risk.

What changed:

- Improved link sanitization in rendered messages
- Limited links to safe protocols and safe navigation targets
- Invalid or suspicious links are now neutralized instead of opened
- Improved external-link handling to reduce tab hijacking risk

This closes the classic "user-controlled link value" hole where bad schemes can sneak into rendered anchors.

Closing note

Security hardening is always ongoing work.

This week was heavier than usual because @louis88 reached out with a bunch of very detailed reports (plus a few false positives, which is normal in this kind of process).

AI tools are now opening up easier and cheaper ways to run security audits across large codebases, and I’m glad we have such a strong Hive community helping build and improve these apps around the clock.

We’ll keep shipping this kind of work in parallel with features, because the best time to harden systems is before we get surprised.



0
0
0.000
10 comments
avatar

Congratulations for the great work you have done to believe in Hive and for strengthening the company every day.

via Apps from

0
0
0.000
avatar

Always good to see people take care of security.

0
0
0.000
avatar

The last two weeks have been crazy. Yesterday Bitwarden...

People will keep using AI to fight AI, and eventually, we will have automatic AI after AI, hacking itself. If that's not already the case for somewhere around the world.

We should have more people like Louis. I confess it's not an area I enjoy. Even if part of my daily job responsibilities (maybe that's why I don't enjoy it LOL).

0
0
0.000
avatar

Yeah, the bitwarden cli thing is scary 😔

0
0
0.000
avatar

Greetings @asgarth ,

Thank you for these posts lettings us know how things are going behind the scenes and the visible changes as well.

There is a slight issue...that I have been hoping would be addressed and hasn't been.

Perhaps there is something I can do at my end and that would be great.

The issue is ...when scrolling through Snapps....a blasting terrible noise is heard all of the sudden...if and when I should come across a Skateboarding Live post. Yes...we have a mute feature available to us....which has provided some relief...but not enough.

Please help....Snaps is such a fine addition to Hive and deserves Hivers enthusiastic support...however this particular issue is so off-putting....your assistance in the matter would be much appreciated as always.

Kind Regards,

Bleujay

0
0
0.000
avatar

I'm not sure to fully understand the problem. Whenever you see a Skateboarding Live snap there is a video with autoplay enabled? And the sound is from the video?

0
0
0.000
avatar
(Edited)

Yes @asgarth

Yes...whilst scrolling before I even see the actual Snap itself....the sound begins...

0
0
0.000
avatar

Congratulations @asgarth! Your post has been a top performer on the Hive blockchain and you have been rewarded with this rare badge

Post with the highest payout of the week.

You can view your badges on your board and compare yourself to others in the Ranking
If you no longer want to receive notifications, reply to this comment with the word STOP

0
0
0.000