Skip to content

Commit 158bbfc

Browse files
authored
Update index.md
1 parent 06a7823 commit 158bbfc

File tree

1 file changed

+10
-30
lines changed

1 file changed

+10
-30
lines changed

index.md

Lines changed: 10 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -2,41 +2,21 @@
22

33
layout: col-sidebar
44
title: OWASP Randomized Header Channel for CSRF Protection
5-
tags: csrf security headers token-based-authentication distributed-systems
5+
tags: example-tag
66
level: 2
77
type: documentation
8-
pitch: A security technique that introduces randomized header channels to strengthen CSRF protection in modern architectures.
8+
pitch: A very brief, one-line description of your project
99

1010
---
1111

12-
The **Randomized Header Channel (RHC)** is a security technique designed to increase the integrity and unpredictability of token transmission in web applications. The method proposes rotating multiple valid request headers for token delivery on each request, making it significantly harder for attackers to perform interception, automation, replay, or predictive token-placement attacks.
12+
This project proposes a security technique titled “Randomized Header Channel for CSRF Protection”. It introduces unpredictability in CSRF token transmission by rotating between multiple valid headers per request, making attacks like interception, automation, or replay significantly harder.
1313

14+
The idea was originally developed in Spanish and translated into English for community review. The method was designed during the development of a real-world SaaS platform and has practical application in JWT-based systems and modern distributed architectures.
1415

15-
**RHC** was originally conceptualized and documented in Spanish during the development of a real-world SaaS platform that required secure, stateless, and high-availability communication channels. The technique aligns naturally with **JWT-based authentication**, microservices, and distributed architectures where traditional CSRF protections may be insufficient or incompatible.
16+
I hope this can be a valuable contribution to the OWASP community, especially in the areas of token-based authentication and request integrity.
1617

17-
18-
### Key Objectives
19-
- Introduce unpredictability in token transportation mechanisms.
20-
21-
- Reduce token-targeting opportunities during request interception.
22-
23-
- Provide a lightweight and implementation-agnostic layer that complements existing CSRF defenses.
24-
25-
- Facilitate adoption through clear documentation and implementations for developers and security professionals.
26-
27-
28-
### Roadmap
29-
1. Submit the proposal for community review.
30-
31-
2. Collect feedback from OWASP leaders, contributors, and security practitioners.
32-
33-
3. Expand documentation with architecture diagrams, entropy analysis, and practical examples.
34-
35-
4. Publish recommended integration patterns for common frameworks.
36-
37-
5. Maintain the project as open security documentation long-term.
38-
39-
---
40-
41-
## Contribute
42-
Contributions are welcome. Please submit pull requests, issues, or implementation proposals in the GitHub repository.
18+
### Road Map
19+
1.- Submit idea for review.
20+
2.- Collect feedback from OWASP community.
21+
3.- Adjust documentation if needed and add implementation examples.
22+
4.- Publish and maintain the project as open security documentation.

0 commit comments

Comments
 (0)