security
Security Fix
Find and fix security issues in $ARGUMENTS (or the whole app if no argument is given). Work through every step below in order. Every step that finds an issue must also fix it.
Step 1 — Map the attack surface
Read these files before checking anything:
src/main.tsx/src/App.tsx— entry point, routing, auth gatingvite.config.ts— dev server proxy, CORS, headerspackage.json— list of third-party dependencies- Any file matching
**/auth*,**/login*,**/token*,**/credential*
Identify:
- All pages/routes and whether each is behind an auth guard
- All places where external data enters the app (CDF SDK calls,
fetch, user form input) - All places where data is written back (CDF upsert,
fetchPOST/PUT/DELETE)
Step 2 — Migrate all CDF access to the Cognite SDK
All traffic to Cognite Data Fusion (CDF) must go through the official Cognite SDK. Find any HTTP, WebSocket, or other network call to CDF-like hosts or APIs that bypasses the SDK and rewrite it to use the SDK.
Search for raw HTTP calls
# Find fetch, axios, XMLHttpRequest, and other HTTP client usage
grep -rn --include="*.ts" --include="*.tsx" --include="*.js" \
-E "(fetch\(|axios\.|axios\(|XMLHttpRequest|\.ajax\(|http\.get\(|http\.post\(|request\()" src/
# Find raw URL construction that looks like CDF endpoints
grep -rn --include="*.ts" --include="*.tsx" \
-E "(cognitedata\.com|cognite\.ai|/api/v1/projects|cdf\.|\.cognite\.)" src/
# Find custom Authorization or api-key headers
grep -rn --include="*.ts" --include="*.tsx" \
-E "(Authorization|api-key|apikey|x-api-key)" src/ | grep -v "node_modules"
How to fix
For each raw CDF call found, read the surrounding code to understand what CDF resource and operation it targets, then rewrite it using the appropriate SDK method. Remove the raw HTTP client import if it's no longer used.
| Pattern | Action |
|---|---|
fetch() or axios call to a CDF URL (*.cognitedata.com, /api/v1/projects/*) |
Rewrite to use the Cognite SDK (cognite.files.getDownloadUrls(...), cognite.timeseries.retrieve(...), client.instances.search(...), etc.) |
Custom Authorization header with a CDF token |
Remove — the SDK handles auth automatically |
| WebSocket connection to CDF endpoints | Rewrite to use SDK streaming methods |
| Proxy endpoint that forwards to CDF internally | Rewrite the proxy to use the SDK internally |
fetch() to a non-CDF URL (static assets, documented third-party API) |
Leave — but add a comment documenting why it's needed |
After rewriting all CDF calls, remove any axios or fetch-related imports that are no longer used.
What is acceptable
- All CDF reads/writes through
sdk.files.*,sdk.timeseries.*,client.instances.*, etc. - Non-CDF network calls that are:
- To known static asset hosts (CDNs, image services)
- To documented third-party APIs required by the product
- Explicitly noted in the app's README or architecture docs
Step 3 — Find and fix credential & secret hygiene
Search for hard-coded credentials and sensitive values:
# Look for anything that smells like a secret in source files
grep -rn --include="*.ts" --include="*.tsx" --include="*.js" \
-E "(password|secret|apikey|api_key|token|bearer|private_key)\s*=\s*['\"]" src/
For each hardcoded secret, replace it with an environment variable. Create or update .env.example with a placeholder. Add .env to .gitignore if missing.
How to fix
-
Replace each hardcoded secret with an
import.meta.env.VITE_*reference. For example:const apiKey = "sk-abc123"→const apiKey = import.meta.env.VITE_API_KEYconst token = "eyJhbG..."→const token = import.meta.env.VITE_AUTH_TOKEN
-
Add the variable to
.env.examplewith a placeholder value (e.g.,VITE_API_KEY=your-api-key-here). Create.env.exampleif it doesn't exist. -
Ensure
.envand.env.localare in.gitignore— add them if missing. -
Remove any
console.log,console.error, or similar calls that print a CDF token, user object, or API key.
Step 4 — Find and fix dangerous DOM APIs
Search for patterns that allow arbitrary script execution or HTML injection:
grep -rn --include="*.tsx" --include="*.ts" \
-E "dangerouslySetInnerHTML|innerHTML\s*=|eval\(|new Function\(|setTimeout\(['\"]|setInterval\(['\"]" src/
For each dangerous DOM pattern, apply the fix directly. Install DOMPurify with pnpm add dompurify and pnpm add -D @types/dompurify if needed.
How to fix
-
dangerouslySetInnerHTML: Wrap the value withDOMPurify.sanitize(). Addimport DOMPurify from 'dompurify'to the file. Example:// Before <div dangerouslySetInnerHTML={{ __html: userContent }} /> // After import DOMPurify from 'dompurify'; <div dangerouslySetInnerHTML={{ __html: DOMPurify.sanitize(userContent) }} /> -
eval()/new Function(): Rewrite using a data-driven approach. UseJSON.parse()for data parsing, or a lookup table / switch statement for dynamic logic dispatch. Never pass user-controlled strings to code evaluation. -
setTimeout/setIntervalwith a string argument: Convert to a function reference:// Before setTimeout("doSomething()", 1000) // After setTimeout(() => doSomething(), 1000)
Step 5 — Find and fix authentication & authorization gaps
Read the auth setup (likely src/contexts/, src/hooks/, or setup-dune-auth output):
- Every route that shows CDF data must be behind the Dune auth guard (
useCogniteClientreturns a non-nullsdkbefore rendering). - The CDF client must be initialized with short-lived OIDC tokens, not a static API key.
- User role/capability checks must happen server-side (CDF ACLs) — do not rely solely on hiding UI elements.
Check the useAtlasChat / Atlas agent integration:
- The
agentExternalIdmust not be constructed from user-supplied input. - Tool
executefunctions must not trustargsblindly — validate or guard before using values in CDF queries.
How to fix
For each unguarded route that shows CDF data, wrap it with the auth guard component. For example, ensure the route element is wrapped in a component that checks useCogniteClient and renders a loading/login state when the SDK is not ready.
For Atlas tool execute functions, add argument validation at the top of each function. Validate that each args field is the expected type and within expected bounds before using it in any CDF query.
Step 6 — Find and fix input validation gaps
Every value that comes from a form, URL param, or query string before it reaches a CDF call or is rendered to the DOM must be validated:
# Find useSearchParams, URLSearchParams, and form onChange handlers
grep -rn --include="*.tsx" --include="*.ts" \
-E "useSearchParams|URLSearchParams|searchParams\.get|e\.target\.value" src/
For each unvalidated external input, add runtime validation. Install Zod if not present (pnpm add zod). Create a schema that matches the expected shape and use .safeParse() instead of type casts.
How to fix
-
Add Zod schemas for URL params and form inputs. Example:
import { z } from 'zod'; const paramSchema = z.object({ id: z.string().min(1), page: z.coerce.number().int().positive().default(1), }); const result = paramSchema.safeParse({ id: searchParams.get('id'), page: searchParams.get('page') }); if (!result.success) { /* handle error */ } -
Replace
as MyTypecasts on external data with Zod.safeParse()— never trust data from URL params, form inputs, or API responses without validation. -
Add nullish fallbacks for
searchParams.get()— always handle the case where the param is missing or empty.
Step 7 — Find and fix Vite / server configuration
Read vite.config.ts and any server.ts / express.ts files.
How to fix
Add any missing security headers to the vite.config.ts server.headers section. If the section doesn't exist, create it. The minimum required headers are:
server: {
headers: {
'Content-Security-Policy': "default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; connect-src 'self' https://*.cognitedata.com",
'X-Frame-Options': 'DENY',
'X-Content-Type-Options': 'nosniff',
},
}
Adjust the Content-Security-Policy to match the app's actual needs (e.g., adding specific CDN hosts for fonts or images).
Also:
- Remove any
defineentries invite.config.tsthat embed raw secrets into the bundle. Useimport.meta.envinstead. - Confirm the dev proxy (
server.proxy) does not expose internal endpoints in production builds.
Step 8 — Find and fix dependency vulnerabilities
pnpm audit --audit-level=high
How to fix
- Run
pnpm audit fixfirst to auto-fix what's possible. - For any remaining high/critical CVEs, manually update the package version in
package.jsonand runpnpm install. - If a vulnerable package has no fix available, document it as a known risk and check if there's an alternative package.
Step 9 — Report remaining findings
Report only issues that could not be auto-fixed (e.g., architectural decisions that need human judgment, packages with no available fix, or patterns that require significant refactoring).
Summarize what was fixed in each step:
| Step | What was fixed | Remaining issues |
|---|---|---|
| 2 — CDF SDK | Migrated N raw calls to SDK | (any that couldn't be migrated) |
| 3 — Credentials | Replaced N hardcoded secrets with env vars | (any that need human decision) |
| 4 — DOM | Sanitized N dangerous patterns | (any that need refactoring) |
| 5 — Auth | Wrapped N unguarded routes | (any architectural gaps) |
| 6 — Validation | Added Zod schemas to N inputs | (any that need custom logic) |
| 7 — Vite config | Added N security headers | (any CSP tuning needed) |
| 8 — Dependencies | Fixed N vulnerable packages | (any with no available fix) |
If any remaining issues require immediate action before deployment, list them explicitly.
Done
State what was fixed and confirm the app is more secure. List any remaining items that require human judgment before the next deployment.