TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Launch HN: Templarbit (YC S17) – Protect Your Web Apps from XSS Attacks

64 点作者 zinssmeister将近 8 年前
Hi everyone! I am Bjoern from Templarbit (<a href="https:&#x2F;&#x2F;www.templarbit.com" rel="nofollow">https:&#x2F;&#x2F;www.templarbit.com</a>). Me and my co-founder Matthias are part of the current YC batch and are excited to launch our product. Templarbit protects web applications from XSS attacks and other malicious activity.<p>Previously Matthias and I worked together at a cyber security firm where we saw many vulnerability reports. After spending some time running engineering at another startup we realized there is a big need for a security solution that can easily be understood and deployed. Something that helps software teams protect what they are building. We reached out to friends and strangers at other software startups to see how they handle the security of their applications. Surprisingly to us, not many teams felt like they did a good job in that area, mostly due to lack of tools available to them.<p>With the advent of browser support for Content Security Policies, there are new ways to protect against these attacks. Setting a CSP header is a great way to mitigate XSS attacks, but managing changes to the policy and having a reporting endpoint that gives you insights into what is being violated is still difficult. Templarbit helps with this. Our reporting dashboard can help you discover and fix violations in real-time and shows you in most cases exactly where in your app the issue exists.

13 条评论

thephyber将近 8 年前
The most dangerous part of XSS is what developers <i>don&#x27;t</i> <i>know</i> is possible. There are lots of sinks and sources and the more features browsers support, the more surface area is exposed.<p>Lots of developers intuitively notice reflective XSS, but fewer notice persistent XSS and even fewer know about DOM-based XSS. Each of these has several, even dozens, of sinks and sources to check + be aware of.<p>I think your offerings would be vastly more valuable if you had a CSP policy generator that defaults to the strictest possible settings, allowing the user to opt out &#x2F; loosen some rules. Perusing your docs, you only describe a small subset of what CSP is capable of. Your average user is short on time and will likely copy-paste your example policies as their first implementation iteration.<p>It&#x27;s important to explain that <i>every</i> page on their domain should be protected by a CSP policy. Protecting just a subset of the domain means that there is still vulnerable surface area.<p>Iframe embeds. Injected forms. Injected IMG tags. Injected meta tags. Data URIs. SVG DOM events. LocalStorage. Cookie overflow attacks. Charset sniff attacks. Charset attacks against specific databases. IE CSS expressions. Image&#x2F;HTML + JS Polyglots. etc.<p>A developer that isn&#x27;t familiar with all of the possible attacks is likely to not make the CSP as restrictive as needed. I <i>highly</i> recommend if you are going to tackle XSS, try and aim to provide value for <i>all</i> XSS attacks, not just the easiest to defend against.<p>Also, you should provide resources to explain why XSS is dangerous, what is potentially at risk, how much companies pay for XSS on bug bounties, and resources for the developer to know how to craft a successful CSP policy. Without these, you aren&#x27;t selling your value proposition.
评论 #14843177 未加载
ajpikul将近 8 年前
Thanks for doing this, I&#x27;m definitely going to consider it since we&#x27;re implementing token based authentication and my friends have told me XSS is what I should be concerned about there.<p>How did you choose to go with a trial period instead of a freemium model like slack?<p>The issue my startup has with trial periods is that it&#x27;s like &quot;you have 14 days to start generating revenue&quot;. Freemium is better for us because it&#x27;s like &quot;You can learn about our service, and use our service while your staging your release, and when you launch if you&#x27;re viable (traffic+revenue), we&#x27;ll be your partner (ie. charge you)&quot;.<p>That&#x27;s how slack kept us, and Salesforce lost us.<p>We shouldn&#x27;t have to worry about paying while we&#x27;re still learning how to use your service. If I haven&#x27;t on-boarded it by the time the trial runs out, I&#x27;m going to cancel it.<p>Then again, I don&#x27;t know your costs, so forgive me if I&#x27;m wrong.
评论 #14840244 未加载
tomkinson将近 8 年前
Please add pricing. And tip; to get startup founders, don&#x27;t subscribe to the silly moniker that startup&#x27;s price themselves too low. I look at the low, mid and high end price by volume to estimate any new costs now and 6 months down the line. Way too many overpriced services cause it&#x27;s in vogue right now based on VC&#x27;s saying it is. Certainly what you are doing is interesting. Nice work.
whichdan将近 8 年前
Small suggestion: your docs could use a little work. The language switching is broken, and the history state is broken, so when you click around the docs, you quickly end up with 20+ entries in your history.<p>Also, the site could definitely use more copy: how do CSPs work? How does the app work in general? Right now the only real details are in the documentation.<p>Also also, what information ends up back on your servers? Is any user data relayed through an API?<p>It&#x27;s a very cool idea, just non-obvious at first glance what exactly it does :)
评论 #14840993 未加载
Alex3917将近 8 年前
&gt; managing changes to the policy and having a reporting endpoint that gives you insights into what is being violated is still difficult.<p>Is this targeting management at companies with multiple products? As a developer I just use Django Middleware to add this line to all our responses and call it a day:<p>response[&#x27;Content-Security-Policy&#x27;] = &quot;default-src &#x27;none&#x27;&quot;<p>(Well, we still sanitize all our inputs and have the headers to block XSS reflection, but there&#x27;s still not much complexity.)
评论 #14841101 未加载
Scirra_Tom将近 8 年前
I think Google Webmaster tools report some XSS vulnerabilities. I&#x27;m not suggesting their detection is in any way as sophisticated as your solution - but do you see internet search giants offering and improving this sort of service as threat to you in the long term?<p>Congratulations on the launch though, don&#x27;t think this product is targeted towards us though so probably wont get a chance to try it but love the objective.
评论 #14840970 未加载
CiPHPerCoder将近 8 年前
For PHP integration, have you considered hooking into CSP-Builder? (It&#x27;s MIT licensed, so you can just make a private fork for internal use forever, but if you upstream your changes, I&#x27;d greatly appreciate it.)<p><a href="https:&#x2F;&#x2F;github.com&#x2F;paragonie&#x2F;csp-builder" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paragonie&#x2F;csp-builder</a>
评论 #14841615 未加载
manglav将近 8 年前
Are you in the same space as Tcell.io? I think they have been doing this for a few years now.
评论 #14841163 未加载
geedzmo将近 8 年前
Watch out you got a typo on the front page: &quot;A central dashboard shows all secuirty events and directs your attention to the exact part of your application that has issues&quot; - security is spelled wrong
评论 #14842802 未加载
TeMPOraL将近 8 年前
Offtopic - wow, so the links in submission text are clickable now, or is it a special kind of submission?
评论 #14841403 未加载
评论 #14841113 未加载
buremba将近 8 年前
I don&#x27;t want to play with my API headers, if you can verify with TXT record on my domain, that would be great.
评论 #14841625 未加载
dawie将近 8 年前
What does your service cost?
german_http将近 8 年前
looking for this for months. can&#x27;t wait to test it.
评论 #14852404 未加载