Skip to content

Harden external-link handling and disable production source map exposure#48

Draft
Copilot wants to merge 2 commits intomainfrom
copilot/address-security-vulnerabilities
Draft

Harden external-link handling and disable production source map exposure#48
Copilot wants to merge 2 commits intomainfrom
copilot/address-security-vulnerabilities

Conversation

Copy link

Copilot AI commented Mar 12, 2026

This PR addresses security hardening in the web surfaces by removing production source exposure and closing reverse-tabnabbing gaps on external links opened in new tabs.

  • Production source exposure

    • Set productionBrowserSourceMaps to false in apps/www/next.config.ts to prevent shipping browser-readable source maps in production builds.
  • External link hardening (target="_blank")

    • Added rel="noopener noreferrer" to _blank links across affected app and kit components:
      • apps/www/app/(app)/{page,mist/page,veil/page,mist-section}.tsx
      • apps/www/app/(discover)/components/filter-panel.tsx
      • apps/www/components/{site-header,site-footer,marketing/illustrations,marketing/wall-of-love}.tsx
      • packages/dusk-kit/blocks/content/six/index.tsx
    • Normalized attributes where legacy rel="noreferrer" already existed to avoid duplicate rel props.
  • Representative change

    <Link href={testimonial.link} target="_blank" rel="noopener noreferrer">
      {testimonial.name}
    </Link>

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • fonts.googleapis.com
    • Triggering command: /home/REDACTED/work/_temp/ghcca-node/node/bin/node node /home/REDACTED/work/blocks/blocks/apps/www/node_modules/.bin/../next/dist/bin/next build (dns block)
    • Triggering command: /opt/hostedtoolcache/node/24.14.0/x64/bin/node /opt/hostedtoolcache/node/24.14.0/x64/bin/node /home/REDACTED/work/blocks/blocks/node_modules/.pnpm/next@16.1.6_@babel&#43;core@7.27.1_react-dom@19.2.4_react@19.2.4__react@19.2.4/node_modules/next/dist/server/lib/start-server.js (dns block)
  • pro.tailark.com
    • Triggering command: /opt/hostedtoolcache/node/24.14.0/x64/bin/node /opt/hostedtoolcache/node/24.14.0/x64/bin/node /home/REDACTED/work/blocks/blocks/node_modules/.pnpm/next@16.1.6_@babel&#43;core@7.27.1_react-dom@19.2.4_react@19.2.4__react@19.2.4/node_modules/next/dist/server/lib/start-server.js (dns block)
  • res.cloudinary.com
    • Triggering command: /opt/hostedtoolcache/node/24.14.0/x64/bin/node /opt/hostedtoolcache/node/24.14.0/x64/bin/node /home/REDACTED/work/blocks/blocks/node_modules/.pnpm/next@16.1.6_@babel&#43;core@7.27.1_react-dom@19.2.4_react@19.2.4__react@19.2.4/node_modules/next/dist/server/lib/start-server.js (dns block)

If you need me to access, download, or install something from one of these locations, you can either:


💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.

@vercel
Copy link
Contributor

vercel bot commented Mar 12, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
tailark-blocks Ready Ready Preview, Comment Mar 12, 2026 6:43am

Request Review

Co-authored-by: Meschacirung <47919550+Meschacirung@users.noreply.github.com>
Copilot AI changed the title [WIP] Fix all identified security vulnerabilities Harden external-link handling and disable production source map exposure Mar 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants