Skip to content

Conversation

@edgarpavlovsky
Copy link
Member

@edgarpavlovsky edgarpavlovsky commented Jan 7, 2026

.

Add X-Frame-Options: DENY and CSP frame-ancestors 'none' headers to
prevent the application from being embedded in iframes, mitigating
clickjacking attacks.

- Client (Vercel): Added headers config to vercel.json
- Server (Express): Added security headers middleware
- Also added X-Content-Type-Options: nosniff for MIME sniffing protection
@edgarpavlovsky edgarpavlovsky changed the title fix: add clickjacking protection with security headers fix: headers Jan 7, 2026
@github-actions
Copy link
Contributor

github-actions bot commented Jan 7, 2026

✅ Changeset Detected

Thanks for adding a changeset! This change will be included in the next release.

@edgarpavlovsky edgarpavlovsky merged commit f532bd4 into main Jan 7, 2026
11 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants