Skip to content

Root path publicly accessibleΒ #992

@frodoagu

Description

@frodoagu

Hi team πŸ‘‹

We've noticed that when deploying Policy Bot, the root endpoint (/) is publicly accessible and returns an HTML page with a some information that we don't want to expose.

While the root path currently does not expose sensitive data, this may:

  • Reveal implementation details about the CI/CD pipeline to external parties (e.g., the use of Policy Bot).
  • Provide an unauthenticated endpoint that could be expanded in future versions, increasing risk.
  • Contradict best practices around minimizing exposed surface area in production systems.

Suggested improvement:

  • Require authentication for the root path
  • Provide a configuration flag to disable or restrict public access to the / endpoint.

Let me know if you'd be open to a PR or if there are existing workarounds. Thanks for the great tool!

β€” Fede

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions