Has anybody been in contact with any of the Django core developers? It
would be nice to let them know about this project and so it's easier to
have dialog if we find things that we feel should be addressed.
- Someone should comb through the Django scaffolding and admin
application to check for CSRF vulnerability, leaking sensitive
information through URLs, and unvalidated redirects
I would be up for assisting with this. In particular I can see the need
to add in some clickjacking protections, possibly a x-frame-options
middleware option?
- I'd like to take a closer look at Django's ORM. [3] Does it use
bound parameters for all backends? Can developers write raw SQL with
bound parameters, or is it just using string interpolation? What
escaping mechanisms are provided in this case?
Here are some notes I had about raw SQL statements and identifying them
in code...
* Check for the use of raw sql statements
grep -R ".raw(" *
grep -R ".execute(" *
Make sure that params are passed in as a list and that string formatting is not used.
I think our efforts towards securing Django could culminate in a
single-page handout on hardening Django. Such a handout would cover
many of the same topics that the wiki page covers, but keep it brief
and focus on what is needed to secure applications in Django. Comments?