django-security

安装量: 1.2K
排名: #1141

安装

npx skills add https://github.com/affaan-m/everything-claude-code --skill django-security

Django Security Best Practices Comprehensive security guidelines for Django applications to protect against common vulnerabilities. When to Activate Setting up Django authentication and authorization Implementing user permissions and roles Configuring production security settings Reviewing Django application for security issues Deploying Django applications to production Core Security Settings Production Settings Configuration

settings/production.py

import os DEBUG = False

CRITICAL: Never use True in production

ALLOWED_HOSTS

os . environ . get ( 'ALLOWED_HOSTS' , '' ) . split ( ',' )

Security headers

SECURE_SSL_REDIRECT

True SESSION_COOKIE_SECURE = True CSRF_COOKIE_SECURE = True SECURE_HSTS_SECONDS = 31536000

1 year

SECURE_HSTS_INCLUDE_SUBDOMAINS

True SECURE_HSTS_PRELOAD = True SECURE_CONTENT_TYPE_NOSNIFF = True SECURE_BROWSER_XSS_FILTER = True X_FRAME_OPTIONS = 'DENY'

HTTPS and Cookies

SESSION_COOKIE_HTTPONLY

True CSRF_COOKIE_HTTPONLY = True SESSION_COOKIE_SAMESITE = 'Lax' CSRF_COOKIE_SAMESITE = 'Lax'

Secret key (must be set via environment variable)

SECRET_KEY

os . environ . get ( 'DJANGO_SECRET_KEY' ) if not SECRET_KEY : raise ImproperlyConfigured ( 'DJANGO_SECRET_KEY environment variable is required' )

Password validation

AUTH_PASSWORD_VALIDATORS

[ { 'NAME' : 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator' , } , { 'NAME' : 'django.contrib.auth.password_validation.MinimumLengthValidator' , 'OPTIONS' : { 'min_length' : 12 , } } , { 'NAME' : 'django.contrib.auth.password_validation.CommonPasswordValidator' , } , { 'NAME' : 'django.contrib.auth.password_validation.NumericPasswordValidator' , } , ] Authentication Custom User Model

apps/users/models.py

from django . contrib . auth . models import AbstractUser from django . db import models class User ( AbstractUser ) : """Custom user model for better security.""" email = models . EmailField ( unique = True ) phone = models . CharField ( max_length = 20 , blank = True ) USERNAME_FIELD = 'email'

Use email as username

REQUIRED_FIELDS

[ 'username' ] class Meta : db_table = 'users' verbose_name = 'User' verbose_name_plural = 'Users' def str ( self ) : return self . email

settings/base.py

AUTH_USER_MODEL

'users.User' Password Hashing

Django uses PBKDF2 by default. For stronger security:

PASSWORD_HASHERS

[ 'django.contrib.auth.hashers.Argon2PasswordHasher' , 'django.contrib.auth.hashers.PBKDF2PasswordHasher' , 'django.contrib.auth.hashers.PBKDF2SHA1PasswordHasher' , 'django.contrib.auth.hashers.BCryptSHA256PasswordHasher' , ] Session Management

Session configuration

SESSION_ENGINE

'django.contrib.sessions.backends.cache'

Or 'db'

SESSION_CACHE_ALIAS

'default' SESSION_COOKIE_AGE = 3600 * 24 * 7

1 week

SESSION_SAVE_EVERY_REQUEST

False SESSION_EXPIRE_AT_BROWSER_CLOSE = False

Better UX, but less secure

Authorization Permissions

models.py

from django . db import models from django . contrib . auth . models import Permission class Post ( models . Model ) : title = models . CharField ( max_length = 200 ) content = models . TextField ( ) author = models . ForeignKey ( User , on_delete = models . CASCADE ) class Meta : permissions = [ ( 'can_publish' , 'Can publish posts' ) , ( 'can_edit_others' , 'Can edit posts of others' ) , ] def user_can_edit ( self , user ) : """Check if user can edit this post.""" return self . author == user or user . has_perm ( 'app.can_edit_others' )

views.py

from django . contrib . auth . mixins import LoginRequiredMixin , PermissionRequiredMixin from django . views . generic import UpdateView class PostUpdateView ( LoginRequiredMixin , PermissionRequiredMixin , UpdateView ) : model = Post permission_required = 'app.can_edit_others' raise_exception = True

Return 403 instead of redirect

def get_queryset ( self ) : """Only allow users to edit their own posts.""" return Post . objects . filter ( author = self . request . user ) Custom Permissions

permissions.py

from rest_framework import permissions class IsOwnerOrReadOnly ( permissions . BasePermission ) : """Allow only owners to edit objects.""" def has_object_permission ( self , request , view , obj ) :

Read permissions allowed for any request

if request . method in permissions . SAFE_METHODS : return True

Write permissions only for owner

return obj . author == request . user class IsAdminOrReadOnly ( permissions . BasePermission ) : """Allow admins to do anything, others read-only.""" def has_permission ( self , request , view ) : if request . method in permissions . SAFE_METHODS : return True return request . user and request . user . is_staff class IsVerifiedUser ( permissions . BasePermission ) : """Allow only verified users.""" def has_permission ( self , request , view ) : return request . user and request . user . is_authenticated and request . user . is_verified Role-Based Access Control (RBAC)

models.py

from django . contrib . auth . models import AbstractUser , Group class User ( AbstractUser ) : ROLE_CHOICES = [ ( 'admin' , 'Administrator' ) , ( 'moderator' , 'Moderator' ) , ( 'user' , 'Regular User' ) , ] role = models . CharField ( max_length = 20 , choices = ROLE_CHOICES , default = 'user' ) def is_admin ( self ) : return self . role == 'admin' or self . is_superuser def is_moderator ( self ) : return self . role in [ 'admin' , 'moderator' ]

Mixins

class AdminRequiredMixin : """Mixin to require admin role.""" def dispatch ( self , request , * args , ** kwargs ) : if not request . user . is_authenticated or not request . user . is_admin ( ) : from django . core . exceptions import PermissionDenied raise PermissionDenied return super ( ) . dispatch ( request , * args , ** kwargs ) SQL Injection Prevention Django ORM Protection

GOOD: Django ORM automatically escapes parameters

def get_user ( username ) : return User . objects . get ( username = username )

Safe

GOOD: Using parameters with raw()

def search_users ( query ) : return User . objects . raw ( 'SELECT * FROM users WHERE username = %s' , [ query ] )

BAD: Never directly interpolate user input

def get_user_bad ( username ) : return User . objects . raw ( f'SELECT * FROM users WHERE username = { username } ' )

VULNERABLE!

GOOD: Using filter with proper escaping

def get_users_by_email ( email ) : return User . objects . filter ( email__iexact = email )

Safe

GOOD: Using Q objects for complex queries

from django . db . models import Q def search_users_complex ( query ) : return User . objects . filter ( Q ( username__icontains = query ) | Q ( email__icontains = query ) )

Safe

Extra Security with raw()

If you must use raw SQL, always use parameters

User . objects . raw ( 'SELECT * FROM users WHERE email = %s AND status = %s' , [ user_input_email , status ] ) XSS Prevention Template Escaping {# Django auto-escapes variables by default - SAFE #} {{ user_input }} {# Escaped HTML #} {# Explicitly mark safe only for trusted content #} {{ trusted_html | safe }} {# Not escaped #} {# Use template filters for safe HTML #} {{ user_input | escape }} {# Same as default #} {{ user_input | striptags }} {# Remove all HTML tags #} {# JavaScript escaping #} < script

var username = {{ username | escapejs }} ; </ script

Safe String Handling from django . utils . safestring import mark_safe from django . utils . html import escape

BAD: Never mark user input as safe without escaping

def render_bad ( user_input ) : return mark_safe ( user_input )

VULNERABLE!

GOOD: Escape first, then mark safe

def render_good ( user_input ) : return mark_safe ( escape ( user_input ) )

GOOD: Use format_html for HTML with variables

from django . utils . html import format_html def greet_user ( username ) : return format_html ( '{}' , escape ( username ) ) HTTP Headers

settings.py

SECURE_CONTENT_TYPE_NOSNIFF

True

Prevent MIME sniffing

SECURE_BROWSER_XSS_FILTER

True

Enable XSS filter

X_FRAME_OPTIONS

'DENY'

Prevent clickjacking

Custom middleware

from django . conf import settings class SecurityHeaderMiddleware : def init ( self , get_response ) : self . get_response = get_response def call ( self , request ) : response = self . get_response ( request ) response [ 'X-Content-Type-Options' ] = 'nosniff' response [ 'X-Frame-Options' ] = 'DENY' response [ 'X-XSS-Protection' ] = '1; mode=block' response [ 'Content-Security-Policy' ] = "default-src 'self'" return response CSRF Protection Default CSRF Protection

settings.py - CSRF is enabled by default

CSRF_COOKIE_SECURE

True

Only send over HTTPS

CSRF_COOKIE_HTTPONLY

True

Prevent JavaScript access

CSRF_COOKIE_SAMESITE

'Lax'

Prevent CSRF in some cases

CSRF_TRUSTED_ORIGINS

[ 'https://example.com' ]

Trusted domains

Template usage

< form method = "post"

{ % csrf_token % } { { form . as_p } } < button type = "submit"

Submit < / button

< / form

AJAX requests

function getCookie ( name ) { let cookieValue = null ; if ( document . cookie & & document . cookie != = '' ) { const cookies = document . cookie . split ( ';' ) ; for ( let i = 0 ; i < cookies . length ; i + + ) { const cookie = cookies [ i ] . trim ( ) ; if ( cookie . substring ( 0 , name . length + 1 ) == = ( name + '=' ) ) { cookieValue = decodeURIComponent ( cookie . substring ( name . length + 1 ) ) ; break ; } } } return cookieValue ; } fetch ( '/api/endpoint/' , { method : 'POST' , headers : { 'X-CSRFToken' : getCookie ( 'csrftoken' ) , 'Content-Type' : 'application/json' , } , body : JSON . stringify ( data ) } ) ; Exempting Views (Use Carefully) from django . views . decorators . csrf import csrf_exempt @csrf_exempt

Only use when absolutely necessary!

def webhook_view ( request ) :

Webhook from external service

pass File Upload Security File Validation import os from django . core . exceptions import ValidationError def validate_file_extension ( value ) : """Validate file extension.""" ext = os . path . splitext ( value . name ) [ 1 ] valid_extensions = [ '.jpg' , '.jpeg' , '.png' , '.gif' , '.pdf' ] if not ext . lower ( ) in valid_extensions : raise ValidationError ( 'Unsupported file extension.' ) def validate_file_size ( value ) : """Validate file size (max 5MB).""" filesize = value . size if filesize

5 * 1024 * 1024 : raise ValidationError ( 'File too large. Max size is 5MB.' )

models.py

class Document ( models . Model ) : file = models . FileField ( upload_to = 'documents/' , validators = [ validate_file_extension , validate_file_size ] ) Secure File Storage

settings.py

MEDIA_ROOT

'/var/www/media/' MEDIA_URL = '/media/'

Use a separate domain for media in production

MEDIA_DOMAIN

'https://media.example.com'

Don't serve user uploads directly

Use whitenoise or a CDN for static files

Use a separate server or S3 for media files

API Security Rate Limiting

settings.py

REST_FRAMEWORK

{ 'DEFAULT_THROTTLE_CLASSES' : [ 'rest_framework.throttling.AnonRateThrottle' , 'rest_framework.throttling.UserRateThrottle' ] , 'DEFAULT_THROTTLE_RATES' : { 'anon' : '100/day' , 'user' : '1000/day' , 'upload' : '10/hour' , } }

Custom throttle

from rest_framework . throttling import UserRateThrottle class BurstRateThrottle ( UserRateThrottle ) : scope = 'burst' rate = '60/min' class SustainedRateThrottle ( UserRateThrottle ) : scope = 'sustained' rate = '1000/day' Authentication for APIs

settings.py

REST_FRAMEWORK

{ 'DEFAULT_AUTHENTICATION_CLASSES' : [ 'rest_framework.authentication.TokenAuthentication' , 'rest_framework.authentication.SessionAuthentication' , 'rest_framework_simplejwt.authentication.JWTAuthentication' , ] , 'DEFAULT_PERMISSION_CLASSES' : [ 'rest_framework.permissions.IsAuthenticated' , ] , }

views.py

from rest_framework . decorators import api_view , permission_classes from rest_framework . permissions import IsAuthenticated @api_view ( [ 'GET' , 'POST' ] ) @permission_classes ( [ IsAuthenticated ] ) def protected_view ( request ) : return Response ( { 'message' : 'You are authenticated' } ) Security Headers Content Security Policy

settings.py

CSP_DEFAULT_SRC

"'self'" CSP_SCRIPT_SRC = "'self' https://cdn.example.com" CSP_STYLE_SRC = "'self' 'unsafe-inline'" CSP_IMG_SRC = "'self' data: https:" CSP_CONNECT_SRC = "'self' https://api.example.com"

Middleware

class CSPMiddleware : def init ( self , get_response ) : self . get_response = get_response def call ( self , request ) : response = self . get_response ( request ) response [ 'Content-Security-Policy' ] = ( f"default-src { CSP_DEFAULT_SRC } ; " f"script-src { CSP_SCRIPT_SRC } ; " f"style-src { CSP_STYLE_SRC } ; " f"img-src { CSP_IMG_SRC } ; " f"connect-src { CSP_CONNECT_SRC } " ) return response Environment Variables Managing Secrets

Use python-decouple or django-environ

import environ env = environ . Env (

set casting, default value

DEBUG

( bool , False ) )

reading .env file

environ . Env . read_env ( ) SECRET_KEY = env ( 'DJANGO_SECRET_KEY' ) DATABASE_URL = env ( 'DATABASE_URL' ) ALLOWED_HOSTS = env . list ( 'ALLOWED_HOSTS' )

.env file (never commit this)

DEBUG

False SECRET_KEY = your - secret - key - here DATABASE_URL = postgresql : // user : password@localhost : 5432 / dbname ALLOWED_HOSTS = example . com , www . example . com Logging Security Events

settings.py

LOGGING

{ 'version' : 1 , 'disable_existing_loggers' : False , 'handlers' : { 'file' : { 'level' : 'WARNING' , 'class' : 'logging.FileHandler' , 'filename' : '/var/log/django/security.log' , } , 'console' : { 'level' : 'INFO' , 'class' : 'logging.StreamHandler' , } , } , 'loggers' : { 'django.security' : { 'handlers' : [ 'file' , 'console' ] , 'level' : 'WARNING' , 'propagate' : True , } , 'django.request' : { 'handlers' : [ 'file' ] , 'level' : 'ERROR' , 'propagate' : False , } , } , } Quick Security Checklist Check Description DEBUG = False Never run with DEBUG in production HTTPS only Force SSL, secure cookies Strong secrets Use environment variables for SECRET_KEY Password validation Enable all password validators CSRF protection Enabled by default, don't disable XSS prevention Django auto-escapes, don't use |safe with user input SQL injection Use ORM, never concatenate strings in queries File uploads Validate file type and size Rate limiting Throttle API endpoints Security headers CSP, X-Frame-Options, HSTS Logging Log security events Updates Keep Django and dependencies updated Remember: Security is a process, not a product. Regularly review and update your security practices.

返回排行榜