Skip to content

Conversation

@n3rdc4ptn
Copy link
Member

This PR solves some of the smaller security settings.

What this PR does / why we need it:

Which issue(s) this PR fixes:
Fixes #

Special notes for your reviewer:

@n3rdc4ptn n3rdc4ptn self-assigned this Nov 5, 2025
@n3rdc4ptn n3rdc4ptn marked this pull request as draft November 5, 2025 08:51
@n3rdc4ptn n3rdc4ptn marked this pull request as ready for review November 10, 2025 08:42
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR enhances security configuration by adding Content Security Policy (CSP) directives and HTTPS Strict Transport Security (HSTS) settings, while also cleaning up debug code.

  • Adds CSP directives for defaultSrc, styleSrc, and imgSrc
  • Configures HSTS with a 1-year max age and subdomain inclusion
  • Removes debug console.log statement that could expose environment variables

Reviewed Changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 2 comments.

File Description
vite.config.js Adds clarifying comment about sourcemap's purpose for Sentry
server.ts Adds CSP directives and HSTS configuration; removes debug logging of environment variables

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@n3rdc4ptn
Copy link
Member Author

closed in favor of #362 which includes everything from this branch

@n3rdc4ptn n3rdc4ptn closed this Nov 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants