Skip to content

V 01.03#3

Merged
AtlasLabs797 merged 2 commits intomainfrom
V-01.03
Apr 25, 2026
Merged

V 01.03#3
AtlasLabs797 merged 2 commits intomainfrom
V-01.03

Conversation

@AtlasLabs797
Copy link
Copy Markdown
Owner

@AtlasLabs797 AtlasLabs797 commented Apr 25, 2026

New ubdate with better security

@AtlasLabs797 AtlasLabs797 merged commit a1bf0dc into main Apr 25, 2026
5 checks passed
@AtlasLabs797 AtlasLabs797 deleted the V-01.03 branch April 25, 2026 08:40
Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 8df640d869

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +224 to +226
if (!string.IsNullOrWhiteSpace(storedToken.ReemplazadoPor))
{
await RevokeSessionsAfterRefreshReuseAsync(storedToken, now, ipAddress, cancellationToken);
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Stop replayed refresh tokens from revoking sessions repeatedly

This branch revokes all active sessions every time the same already-revoked rotated token is presented, because ReemplazadoPor stays populated permanently and there is no "already handled" guard. In practice, anyone who captured one stale refresh token can keep replaying it until it expires and repeatedly invalidate newly issued sessions for that user (forced logout loop / persistent DoS). The revocation-on-reuse logic should run only on first detection for that token chain.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant