FRE-588: Fix IDOR vulnerabilities and security findings
H1: Add verifyScriptAccess/verifyRevisionAccess to all 14 revisions endpoints H2: Add verifyProjectAccess to listScripts and searchScripts M2: Add cascade delete for projectMembers on project deletion M4: Replace plain Error throws with TRPCError for consistent error handling M5: Use crypto.randomUUID for team ID generation (was Date.now + Math.random) L1: Add 100KB content size limit on revision content L2: Add unique constraint to script slug column L3: Update hasProjectAccess middleware to check project membership
This commit is contained in:
@@ -59,11 +59,18 @@ describe('revisionsRouter', () => {
|
||||
});
|
||||
|
||||
describe('listRevisions', () => {
|
||||
it('should return empty array for unknown script', async () => {
|
||||
const result = await caller.revisions.listRevisions({ scriptId: 999 });
|
||||
it('should return empty array for script with no revisions', async () => {
|
||||
const result = await caller.revisions.listRevisions({ scriptId: 1 });
|
||||
expect(result).toEqual([]);
|
||||
});
|
||||
|
||||
it('should throw NOT_FOUND for unknown script', async () => {
|
||||
const { TRPCError } = await import('./router');
|
||||
await expect(
|
||||
caller.revisions.listRevisions({ scriptId: 999 })
|
||||
).rejects.toThrow(TRPCError);
|
||||
});
|
||||
|
||||
it('should filter by branch', async () => {
|
||||
await caller.revisions.createRevision({
|
||||
scriptId: 1,
|
||||
|
||||
Reference in New Issue
Block a user