Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Token exposed on client side #1001

Open
4 tasks done
vaishak10 opened this issue Jul 2, 2024 · 0 comments
Open
4 tasks done

Token exposed on client side #1001

vaishak10 opened this issue Jul 2, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@vaishak10
Copy link

vaishak10 commented Jul 2, 2024

Description

While the task runs or when you navigate across different routes, came across a client side token call which gives a jwt token in response.
I am confused as to why such sensitive data is exposed and what is this used for. The least thing that can be done is masking the token value for client side.
Also is this a token already available to the user and get's expired once the task is created or any navigation is made back to the task to get the previous results?
Screenshot 2024-07-02 at 9 46 30 AM

Steps to reproduce

  1. Create a Task.
  2. Create a Prospect
  3. Enter the necessary details
  4. Run the task (While the task runs open your network tab and check for the token client side request)

Acknowledgements

  • My issue title is concise, descriptive.
  • I have searched the existing issues to make sure this bug has not been reported yet.
  • I am using the latest version of superagent.
  • I have provided enough information for the maintainers to reproduce and diagnose the issue.
@vaishak10 vaishak10 added the bug Something isn't working label Jul 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant