Skip to content

release: production-ready launch candidate#31

Merged
DevCalebR merged 14 commits intomainfrom
codex/release/production-ready
Mar 9, 2026
Merged

release: production-ready launch candidate#31
DevCalebR merged 14 commits intomainfrom
codex/release/production-ready

Conversation

@DevCalebR
Copy link
Copy Markdown
Owner

This branch merges production launch work:

  • P0 security hardening
  • recording security proxy
  • product UX / legal pages
  • production master roadmap
  • launch checklist
  • health endpoint
  • error boundaries

Do NOT merge the PR.

@vercel
Copy link
Copy Markdown

vercel bot commented Mar 9, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
callbackcloser Ready Ready Preview, Comment Mar 9, 2026 6:19am

Request Review

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: e5eacbdd44

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +39 to +40
// If no origin/referrer is provided, do not hard-fail to avoid blocking non-browser clients.
return true;
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Reject malformed Origin headers in request-origin guard

When the request includes an unparsable Origin value (for example Origin: null from opaque/sandboxed browser contexts), parseOrigin returns null and the function falls through to the permissive branch that returns true. Because the Stripe mutation routes now depend on this helper for CSRF protection in production, those malformed-origin browser requests are accepted instead of denied.

Useful? React with 👍 / 👎.

Comment on lines +26 to +27
const expectedOrigin = parseOrigin(appBaseUrl);
if (!expectedOrigin) return true;
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Deny requests when expected app origin is unresolved

If appBaseUrl is missing or invalid, expectedOrigin becomes null and this helper immediately allows the request. That creates a fail-open path where production checkout/portal POSTs lose origin validation entirely during env misconfiguration, which defeats the protection this commit introduces.

Useful? React with 👍 / 👎.

@DevCalebR DevCalebR merged commit f6087f8 into main Mar 9, 2026
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant