chore: sync with upstream e7cb442 + update zh translations

This commit is contained in:
xuxiang
2026-02-02 18:57:56 +08:00
parent 6f87d43c19
commit d7cafbe582
66 changed files with 9395 additions and 1465 deletions

View File

@@ -1,17 +1,17 @@
---
name: springboot-security
description: Spring Security best practices for authn/authz, validation, CSRF, secrets, headers, rate limiting, and dependency security in Java Spring Boot services.
description: Spring Boot 服务中关于身份认证/授权authn/authz、校验、CSRF、密钥管理、响应头、限流及依赖安全的 Spring Security 最佳实践。
---
# Spring Boot Security Review
# Spring Boot 安全审查
Use when adding auth, handling input, creating endpoints, or dealing with secrets.
在添加认证、处理输入、创建端点或处理密钥时使用。
## Authentication
## 身份认证(Authentication
- Prefer stateless JWT or opaque tokens with revocation list
- Use `httpOnly`, `Secure`, `SameSite=Strict` cookies for sessions
- Validate tokens with `OncePerRequestFilter` or resource server
- 优先使用无状态 JWT 或带有撤回列表Revocation List的不透明令牌Opaque Tokens
- 为会话Session使用 `httpOnly``Secure``SameSite=Strict` 的 Cookie
- 使用 `OncePerRequestFilter` 或资源服务器验证令牌
```java
@Component
@@ -36,27 +36,27 @@ public class JwtAuthFilter extends OncePerRequestFilter {
}
```
## Authorization
## 授权(Authorization
- Enable method security: `@EnableMethodSecurity`
- Use `@PreAuthorize("hasRole('ADMIN')")` or `@PreAuthorize("@authz.canEdit(#id)")`
- Deny by default; expose only required scopes
- 启用方法级安全:`@EnableMethodSecurity`
- 使用 `@PreAuthorize("hasRole('ADMIN')")` `@PreAuthorize("@authz.canEdit(#id)")`
- 默认拒绝(Deny by default仅暴露必要的权限范围Scopes
## Input Validation
## 输入校验(Input Validation
- Use Bean Validation with `@Valid` on controllers
- Apply constraints on DTOs: `@NotBlank`, `@Email`, `@Size`, custom validators
- Sanitize any HTML with a whitelist before rendering
- 在控制器Controller上配合使用 Bean Validation `@Valid`
- 在 DTO 上应用约束:`@NotBlank``@Email``@Size` 以及自定义校验器
- 在渲染之前,通过白名单对任何 HTML 进行净化Sanitize
## SQL Injection Prevention
## 防止 SQL 注入
- Use Spring Data repositories or parameterized queries
- For native queries, use `:param` bindings; never concatenate strings
- 使用 Spring Data 存储库Repositories)或参数化查询
- 对于原生查询,使用 `:param` 绑定;严禁拼接字符串
## CSRF Protection
## CSRF 防护
- For browser session apps, keep CSRF enabled; include token in forms/headers
- For pure APIs with Bearer tokens, disable CSRF and rely on stateless auth
- 对于基于浏览器会话的应用,保持启用 CSRF在表单/请求头中包含令牌
- 对于使用 Bearer 令牌的纯 API禁用 CSRF 并依赖无状态认证
```java
http
@@ -64,13 +64,13 @@ http
.sessionManagement(sm -> sm.sessionCreationPolicy(SessionCreationPolicy.STATELESS));
```
## Secrets Management
## 密钥管理(Secrets Management
- No secrets in source; load from env or vault
- Keep `application.yml` free of credentials; use placeholders
- Rotate tokens and DB credentials regularly
- 源代码中不保留密钥;从环境变量或 Vault 加载
- 确保 `application.yml` 中没有凭据;使用占位符
- 定期轮换令牌和数据库凭据
## Security Headers
## 安全响应头(Security Headers
```java
http
@@ -79,41 +79,41 @@ http
.policyDirectives("default-src 'self'"))
.frameOptions(HeadersConfigurer.FrameOptionsConfig::sameOrigin)
.xssProtection(Customizer.withDefaults())
.referrerPolicy(rp -> rp.policy(ReferrerPolicyHeaderWriter.ReferrerPolicy.NO_REFERRER)));
.referrerPolicy(rp -> rp.policy(ReferrerPolicyHeaderWriter.ReferrerPolicy.NO_REFER_ER)));
```
## Rate Limiting
## 限流(Rate Limiting
- Apply Bucket4j or gateway-level limits on expensive endpoints
- Log and alert on bursts; return 429 with retry hints
- 在高开销端点上应用 Bucket4j 或网关级限流
- 对突发流量进行日志记录并告警;返回 429 状态码及重试提示
## Dependency Security
## 依赖安全(Dependency Security
- Run OWASP Dependency Check / Snyk in CI
- Keep Spring Boot and Spring Security on supported versions
- Fail builds on known CVEs
- 在 CI 中运行 OWASP Dependency Check / Snyk
- 保持 Spring Boot Spring Security 处于受支持的版本
- 发现已知 CVE 时构建失败
## Logging and PII
## 日志与个人敏感信息(PII
- Never log secrets, tokens, passwords, or full PAN data
- Redact sensitive fields; use structured JSON logging
- 严禁在日志中记录密钥、令牌、密码或完整的银行卡号PAN数据
- 脱敏敏感字段;使用结构化 JSON 日志记录
## File Uploads
## 文件上传
- Validate size, content type, and extension
- Store outside web root; scan if required
- 校验大小、内容类型Content Type)和扩展名
- 存储在 Web 根目录之外;必要时进行扫描
## Checklist Before Release
## 发布前自检清单
- [ ] Auth tokens validated and expired correctly
- [ ] Authorization guards on every sensitive path
- [ ] All inputs validated and sanitized
- [ ] No string-concatenated SQL
- [ ] CSRF posture correct for app type
- [ ] Secrets externalized; none committed
- [ ] Security headers configured
- [ ] Rate limiting on APIs
- [ ] Dependencies scanned and up to date
- [ ] Logs free of sensitive data
- [ ] 身份认证令牌已正确验证并配置过期时间
- [ ] 每个敏感路径都有授权保护
- [ ] 所有输入均已校验并净化
- [ ] 没有字符串拼接的 SQL
- [ ] CSRF 配置符合应用类型
- [ ] 密钥已外部化;未提交任何密钥
- [ ] 安全响应头已配置
- [ ] API 已配置限流
- [ ] 依赖已扫描且为最新
- [ ] 日志中不包含敏感数据
**Remember**: Deny by default, validate inputs, least privilege, and secure-by-configuration first.
**记住**:默认拒绝、校验输入、最小权限原则,以及配置优先的安全性。