security: set sensible defaults for security response headers
X-Content-Type-Options, X-Frame-Options, and Referrer-Policy all defaulted to empty (disabled). Set defaults to nosniff, DENY, and strict-origin-when-cross-origin respectively. Operators can still override or disable via environment variables. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
committed by
Abhimanyu Saharan
parent
c7f8578f38
commit
8e145a2129
@@ -49,11 +49,12 @@ class Settings(BaseSettings):
|
||||
clerk_leeway: float = 10.0
|
||||
|
||||
cors_origins: str = ""
|
||||
base_url: str
|
||||
# Security response headers (blank disables header injection)
|
||||
security_header_x_content_type_options: str = ""
|
||||
security_header_x_frame_options: str = ""
|
||||
security_header_referrer_policy: str = ""
|
||||
base_url: str = ""
|
||||
|
||||
# Security response headers (set to blank to disable a specific header)
|
||||
security_header_x_content_type_options: str = "nosniff"
|
||||
security_header_x_frame_options: str = "DENY"
|
||||
security_header_referrer_policy: str = "strict-origin-when-cross-origin"
|
||||
security_header_permissions_policy: str = ""
|
||||
|
||||
# Database lifecycle
|
||||
|
||||
Reference in New Issue
Block a user