Latest Updates

Documenting code, one commit at a time.

Laravel PHP OAuth

Limiting OAuth Providers in Laravel

Working on the devlog-ist/landing project, we're refining the authentication flow. The goal is to streamline user registration and login, particularly for non-developers who might be contributing recommendations. We've adjusted the available OAuth providers to match user roles.

Previously, both GitHub and LinkedIn were presented as default options on the login and registration pages.

Read more
PHP Laravel OAuth

Enhancing User Security in Laravel OAuth Implementations

OAuth provides a streamlined approach to user authentication, but it's crucial to implement security measures that protect user data and prevent unauthorized access. A common scenario involves social login, where users authenticate via third-party providers like GitHub or LinkedIn.

The Problem: Unregistered Users and Automatic Registration

A potential vulnerability arises when users not yet

Read more

Enhancing GitHub OAuth Flow: Preserving User Permissions

Introduction

This article discusses a common issue in applications using GitHub OAuth for authentication: inadvertently overwriting a user's existing token with one that has fewer permissions. We'll explore how to ensure the application preserves the user's original, broader-scoped token when requesting narrower scopes during subsequent logins.

The Problem

Many applications use GitHub

Read more

Enhancing Content Security: Integrating Security Audits into the Publishing Workflow

Ensuring the security and integrity of published content is paramount. We've recently integrated a mandatory security audit step into our content generation and publishing pipeline to bolster these efforts.

The Challenge: Maintaining Content Integrity

AI-generated content offers numerous benefits, but also introduces potential security risks. It's crucial to implement safeguards to prevent

Read more

Enhancing Application Security with Rate Limiting and Fine-Grained Access Control

Securing web applications requires a multi-layered approach. Recent updates to our application focused on bolstering security through rate limiting on authentication routes and implementing granular access control for administrative resources.

Rate Limiting Authentication Routes

To mitigate brute-force attacks and other forms of abuse, we've implemented rate limiting on critical

Read more