-
Notifications
You must be signed in to change notification settings - Fork 131
Open
Description
Hi team π
We've noticed that when deploying Policy Bot, the root endpoint (/) is publicly accessible and returns an HTML page with a some information that we don't want to expose.
While the root path currently does not expose sensitive data, this may:
- Reveal implementation details about the CI/CD pipeline to external parties (e.g., the use of Policy Bot).
- Provide an unauthenticated endpoint that could be expanded in future versions, increasing risk.
- Contradict best practices around minimizing exposed surface area in production systems.
Suggested improvement:
- Require authentication for the root path
- Provide a configuration flag to disable or restrict public access to the / endpoint.
Let me know if you'd be open to a PR or if there are existing workarounds. Thanks for the great tool!
β Fede
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels