-
Notifications
You must be signed in to change notification settings - Fork 98
EDU-14724 - FastStore Platform Analyzer #2031
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Navigation Preview LinkNo changes detected in the navigation.json file |
Preview LinksOpen this URL to set up the portal with this branch changes. You can now access the edited pages with the following URLs:
|
Documentation feedback for docs/localization/overview.mdGeneral FeedbackThe Explanation is well-structured and provides a clear overview of the FastStore Analyzer. The content is informative and the table format for "Analyzer rules" is effective. The inclusion of "Guides in this section" with Actionable Feedback
Suggested Revision---
title:"FastStore Analyzer"
---
FastStore Analyzer provides a secure and controlled environment for implementing extension points, ensuring that custom code and third-party extensions don't affect the host application's performance, security, or integrity.
To inspect your project’s code, the Analyzer navigates through each node of your code and captures all function calls made during execution. Once the analysis is complete, it applies predefined rules to detect violations or warning based on established security and performance standards.
## Analyzer rules
The Analyzer works by applying the following rules:
| Available rules | Description |
|-----------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| DOM API access restrictions | Prevents unauthorized access to specific DOM APIs (example: `document`, `window`, `localStorage`) that could potentially lead to security vulnerabilities or interfere with the normal operation of the web application.<br><br>By restricting access to these APIs, the Analyzer ensures your code remains compliant with security best practices and minimizes risks related to direct manipulation of the Document Object Model (DOM). |
| [CSS containment analysis] | Traverses through the PostCSS Abstract Syntax Tree (AST) to detect the use of problematic selectors that can compromise the styling integrity of your application, such as `:root`, `:host`, and `:host-context`.<br><br>These selectors can lead to global style leakage, impacting the look and feel of the entire application instead of being contained within a specific module or component. The Analyzer enforces proper containment practices to ensure that each module's styles don't interfere with those of others. |
| Third-party script loading detection | Prevents the loading of third-party scripts, such as `importScripts`, `eval`, and `new Function`.<br><br>By disallowing these methods of script loading, the Analyzer helps protect your application against vulnerabilities caused by executing arbitrary code or using insecure loading patterns. |
| Core element modification detection | Prevents any modification to essential core elements of the HTML document, such as `body`, `html`, and `head`.<br><br>Ensuring these elements remain unmodified avoids unintended side effects and supports a stable and predictable environment for the application. |
## Guides in this section
<Flex>
<WhatsNextCard
title="Implementing FastStore Analyzer"
description="Learn how to implement FastStore Analyzer in your store."
linkTo="https://developers.vtex.com/docs/guides/faststore/faststore-analyzer-implementation"
linkTitle="See more"
/>
<WhatsNextCard
title="CSS Analysis"
description="Discover how FastStore Analyzer blocks unsafe CSS and auto-fixes non-compliant styles."
linkTo="https://developers.vtex.com/docs/guides/faststore/faststore-analyzer-css-analysis"
linkTitle="See more"
/>
</Flex> Revised Markdown: ---
title:"FastStore Analyzer"
---
FastStore Analyzer provides a secure and controlled environment for implementing extension points, ensuring that custom code and third-party extensions don't affect the host application's performance, security, or integrity.
To inspect your project’s code, the Analyzer navigates through each node of your code and captures all function calls made during execution. Once the analysis is complete, it applies predefined rules to detect violations or warning based on established security and performance standards.
## Analyzer rules
The Analyzer works by applying the following rules:
| Available rules | Description |
|-----------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| DOM API access restrictions | Prevents unauthorized access to specific DOM APIs (example: `document`, `window`, `localStorage`) that could potentially lead to security vulnerabilities or interfere with the normal operation of the web application.<br><br>By restricting access to these APIs, the Analyzer ensures your code remains compliant with security best practices and minimizes risks related to direct manipulation of the Document Object Model (DOM). |
| [CSS containment analysis] | Traverses through the PostCSS Abstract Syntax Tree (AST) to detect the use of problematic selectors that can compromise the styling integrity of your application, such as `:root`, `:host`, and `:host-context`.<br><br>These selectors can lead to global style leakage, impacting the look and feel of the entire application instead of being contained within a specific module or component. The Analyzer enforces proper containment practices to ensure that each module's styles don't interfere with those of others. |
| Third-party script loading detection | Prevents the loading of third-party scripts, such as `importScripts`, `eval`, and `new Function`.<br><br>By disallowing these methods of script loading, the Analyzer helps protect your application against vulnerabilities caused by executing arbitrary code or using insecure loading patterns. |
| Core element modification detection | Prevents any modification to essential core elements of the HTML document, such as `body`, `html`, and `head`.<br><br>Ensuring these elements remain unmodified avoids unintended side effects and supports a stable and predictable environment for the application. |
## Guides in this section
<Flex>
<WhatsNextCard
title="Implementing FastStore Analyzer"
description="Learn how to implement FastStore Analyzer in your store."
linkTo="https://developers.vtex.com/docs/guides/faststore/faststore-analyzer-implementation"
linkTitle="See more"
/>
<WhatsNextCard
title="CSS Analysis"
description="Discover how FastStore Analyzer blocks unsafe CSS and auto-fixes non-compliant styles."
linkTo="https://developers.vtex.com/docs/guides/faststore/faststore-analyzer-css-analysis"
linkTitle="See more"
/>
</Flex> Note: No changes were made to the content of the table, as it already adheres to the tone and voice guidelines. Only the headings were adjusted to sentence case. Was this feedback useful?
|
LOC-20856 - EDU-14724 - FastStore Platform Sandboxing
Documentation feedback for docs/faststore/docs/faststore-platform/faststore-analyzer/overview.mdGeneral FeedbackThe explanation provides a good overview of the FastStore Analyzer and its rules. The content is well-structured and easy to understand. However, there are a few areas where the documentation can be improved to better adhere to the guidelines. Specifically, the table format for describing Analyzer rules could be enhanced for readability and clarity, and the use of Actionable Feedback
Suggested Revision---
title: "FastStore Analyzer"
---
FastStore Analyzer provides a secure and controlled environment for implementing extension points, ensuring that custom code and third-party extensions don't affect the host application's performance, security, or integrity.
To inspect your project’s code, the Analyzer navigates through each node of your code and captures all function calls made during execution. Once the analysis is complete, it applies predefined rules to detect violations or warnings based on established security and performance standards.
## Analyzer Rules
The Analyzer works by applying a set of rules to ensure security and performance. These rules are described below:
### Dom Api Access Restrictions
This rule prevents unauthorized access to specific DOM APIs (e.g., `document`, `window`, `localStorage`) that could potentially lead to security vulnerabilities or interfere with the normal operation of the web application.
By restricting access to these APIs, the Analyzer ensures your code remains compliant with security best practices and minimizes risks related to direct manipulation of the Document Object Model (DOM).
### Css Containment Analysis
This rule traverses through the PostCSS Abstract Syntax Tree (AST) to detect the use of problematic selectors that can compromise the styling integrity of your application, such as `:root`, `:host`, and `:host-context`.
These selectors can lead to global style leakage, impacting the look and feel of the entire application instead of being contained within a specific module or component. The Analyzer enforces proper containment practices to ensure that each module's styles don't interfere with those of others.
### Third-Party Script Loading Detection
This rule prevents the loading of third-party scripts, such as `importScripts`, `eval`, and `new Function`.
By disallowing these methods of script loading, the Analyzer helps protect your application against vulnerabilities caused by executing arbitrary code or using insecure loading patterns.
### Core Element Modification Detection
This rule prevents any modification to essential core elements of the HTML document, such as `body`, `html`, and `head`.
Ensuring these elements remain unmodified avoids unintended side effects and supports a stable and predictable environment for the application.
## Guides in this section
- [Implementing FastStore Analyzer](https://developers.vtex.com/docs/guides/faststore/faststore-analyzer-implementation): Learn how to implement FastStore Analyzer in your store.
- [CSS Analysis](https://developers.vtex.com/docs/guides/faststore/faststore-analyzer-css-analysis): Discover how FastStore Analyzer blocks unsafe CSS and auto-fixes non-compliant styles. Was this feedback useful?
|
fd49c61
to
bba71c2
Compare
44809f5
to
9e4dab3
Compare
Types of changes
EDU-14724