Support AdonisJs development by becoming a patron
Support AdonisJs

Shield Middleware

Apart from Cors and CSRF, AdonisJs also prevents your web applications from other malware attacks like XSS, Content Sniffing, Script Injection, etc. Every new application is pre-configured to make use of the shield middleware which keeps your websites secure.

There is no silver bullet to secure your websites completely. AdonisJs as a framework gives you handful of ways to prevent common web attacks.

Setup & Config

Make sure shield middleware is added to the list of global middleware inside app/Http/kernel.js file.

app/Http/kernel.js
const globalMiddlewares = [
  // ...
  'Adonis/Middleware/Shield'
  // ...
]

The configuration file for shield is available inside config/shield.js file. You are free to configure it as per your needs.

Content Security Policy

Content Security Policy(CSP) helps you in defining the trusted sources for loading and executing scripts, styles, fonts and various other resources.

It is a good practice to be strict when allowing the execution of scripts from different sources. You must read this interesting article by HTML5 rocks.

Configuration

csp block inside the shield configuration file defines the rule for content security policy.

csp: {
  directives: {
    defaultSrc: ['self', 'http://getcdn.com'],
    scriptSrc: ['self', [email protected]'],
    styleSrc: ['http://getbootstrap.com'],
    imgSrc: ['http://dropbox.com']
  },
  reportOnly: false,
  setAllHeaders: false,
  disableAndroid: true
}
Key Value Description

directives

Object

Directives helps you in defining policies to be applied on different resource types. You can get the list of all directives from http://content-security-policy.com.

reportOnly

Boolean

It will not stop the execution of your page, instead, will return a warning that some rules are violated.

setAllHeaders

Boolean

Shield sets different HTTP headers for different browsers. To disable this behavior, you can this value to true, and all headers will be set.

disableAndroid

Boolean

Android is buggy with CSP you can disable it for Android in case you face any troubles.

Browser Support

Almost all modern browsers widely support CSP, but here is the most accurate list of supported browsers.

CSP Policy Via Meta Tags

The shield middleware automatically sets the required HTTP headers for CSP to work but also gives you a view helper to set the meta tag.

{{ cspMeta }}
Output
<meta http-equiv="Content-Security-Policy" content="xxx">

CSP Nonce

Script tags with inline javascript code are automatically trusted and executed by the browser. To stop this behavior, you must only allow the trusted inline script blocks by adding @nonce to the`scriptSrc` array.

csp: {
  directives: {
    scriptSrc: ['self', [email protected]']
  },
  // ...
}

Now you have to tell the browser that your selected inline script blocks should be executed, and that selection is made with the help of a view global.

<script nonce="{{ cspNonce }}">
  // ...
</script>

Malware Protection

Malware protection helps in protecting your website from XSS attacks, unwanted iframe embeds, content-type sniffing and stopping IE from executing unsolicited scripts in the context of your web page.

XSS

Make use of the below defined configuration to enable/disable XSS protection. It is done by setting X-XSS-Protection=1; mode=block

xss: {
  enabled: true,
  enableOnOldIE: false
}

No Sniff

The majority of modern browsers will try to detect the Content-Type of a request by sniffing its content. Which means a file ending in .txt can be executed as javascript file, if it contains javascript code. To disable this behavior set nosniff=false.

Below setting will set the value of X-Content-Type-Options header to nosniff.

{
  nosniff: true
}

No Open

This setting will stop IE from executing unknown script in the context of your website. Below setting with set the value of X-Download-Options to noopen.

{
  noopen: true
}