-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update CHECK_AUTH Query to Prevent Over-Fetching Sensitive PII #3108
Comments
Congratulations on making your first Issue! 🎊 If you haven't already, check out our Contributing Guidelines and Issue Reporting Guidelines to ensure that you are following our guidelines for contributing and making issues. |
I am already working on this issue check here I just have to do some changes in backend code first to solve the issue so kindly assign me |
@palisadoes @Cioppolo14 I have completed all the changes required in backed to solve whole issue so you can assign me so that I can raise a PR for the same. |
Which branch is this for? |
@palisadoes main branch |
We are focusing on the develop-postgres branch. |
@palisadoes ok I will stick with develop-postgres branch from now on thanks for clarification |
Issue related to
PalisadoesFoundation/talawa-admin#3484
Description:
The
CHECK_AUTH
query in thetalawa-api
repository currently exposes unnecessary Personally Identifiable Information (PII) such asbirthDate
,phone.mobile
,educationGrade
,employmentStatus
, andmaritalStatus
. This violates privacy best practices and regulatory standards (GDPR/CCPA).Proposed Fix:
Minimize Fields: Update the
CHECK_AUTH
query to fetch only essential data for authentication (e.g.,_id
,email
,firstName
,image
).Field-Level Permissions: Use
GraphQL
directives (e.g.,@auth
) to restrict access to sensitive fields.Backend Validation: Ensure resolvers enforce access control.
Revised Query Example:
Impact:
Prevents unauthorized exposure of PII.
Ensures compliance with GDPR/CCPA.
Reduces attack surface by limiting sensitive data exposure.
The text was updated successfully, but these errors were encountered: