Open hstove opened 4 years ago
@hstove I read through the diff -- the code looks good and it appears to fix the issue. However, I have little understanding of the general codebase, and definitely don't have the a grasp on the functional end-to-end workings of Radiks needed to really understand the security model.
Is there anything in particular you want reviewed or tested? Otherwise, if you feel confident in the fixes, then I think we should go ahead and merge & release.
Fixes #29
Radiks-server was not properly validating the
updatedAt
attribute for model updates and deletes. This could potentially lead to signature jacking. Radiks-server now validated that theupdatedAt
field is greater than previousupdatedAt
s. This acts similarly to annonce
in blockchains.