Headless API documentation potentially incorrect? (otherwise, might lead to a CSRF vulnerabilty?) #4134
-
Hello! I'm looking at the headless API documentation for So my question is, is the documentation incorrect and it should probably be updated to remove this field from the schema? Or, am I missing something AND there IS a way for this endpoint to return the CCing @pennersr as the author for an expert opinion (let me know if I shouldn't be tagging you directly and/or if there's someone else I should be tagging for this type of question and/or if I shouldn't tag anyone at all on future questions and simply let the community answer it organically 😄 ) Thanks!! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
The Indeed, the documentation shows an example payload there that is not correct. The tokens are only exposed once -- when they are actually issued -- and not repeatedly for each and every other request. |
Beta Was this translation helpful? Give feedback.
The
app
endpoints don't rely on cookies. As a result, a CSRF attack wouldn't work.Indeed, the documentation shows an example payload there that is not correct. The tokens are only exposed once -- when they are actually issued -- and not repeatedly for each and every other request.