hugo

Fork of github.com/gohugoio/hugo with reverse pagination support

git clone git://git.shimmy1996.com/hugo.git

index.md (3933B)

    1 ---
    2 title: Hugo's Security Model
    3 description: A summary of Hugo's security model.
    4 date: 2019-10-01
    5 layout: single
    6 keywords: ["Security", "Privacy"]
    7 menu:
    8   docs:
    9     parent: "about"
   10     weight: 4
   11 weight: 5
   12 sections_weight: 5
   13 draft: false
   14 aliases: [/security/]
   15 toc: true
   16 ---
   17 
   18 ## Runtime Security
   19 
   20 Hugo produces static output, so once built, the runtime is the browser (assuming the output is HTML) and any server (API) that you integrate with.
   21 
   22 But when developing and building your site, the runtime is the `hugo` executable. Securing a runtime can be [a real challenge](https://blog.logrocket.com/how-to-protect-your-node-js-applications-from-malicious-dependencies-5f2e60ea08f9/).
   23 
   24 **Hugo's main approach is that of sandboxing and a security policy with strict defaults:**
   25 
   26 * Hugo has a virtual file system and only the main project (not third-party components) is allowed to mount directories or files outside the project root.
   27 * Only the main project can walk symbolic links.
   28 * User-defined components have read-only access to the filesystem.
   29 * We shell out to some external binaries to support [Asciidoctor](/content-management/formats/#list-of-content-formats) and similar, but those binaries and their flags are predefined and disabled by default (see [Security Policy](#security-policy)). General functions to run arbitrary external OS commands have been [discussed](https://github.com/gohugoio/hugo/issues/796), but not implemented because of security concerns.
   30 
   31 
   32 ## Security Policy
   33 
   34 {{< new-in "0.91.0" >}}
   35 
   36 Hugo has a built-in security policy that restricts access to [os/exec](https://pkg.go.dev/os/exec), remote communication and similar.
   37 
   38 The default configuration is listed below. Any build using features not in the allow list of the security policy will fail with a detailed message about what needs to be done. Most of these settings are allow lists (string or slice, [Regular Expressions](https://pkg.go.dev/regexp) or `none` which matches nothing).
   39 
   40 {{< code-toggle config="security" />}}
   41 
   42 Note that these and other config settings in Hugo can be overridden by the OS environment. If you want to block all remote HTTP fetching of data:
   43 
   44 ```
   45 HUGO_SECURITY_HTTP_URLS=none hugo
   46 ```
   47 
   48 ## Dependency Security
   49 
   50 Hugo is built as a static binary using [Go Modules](https://github.com/golang/go/wiki/Modules) to manage its dependencies. Go Modules have several safeguards, one of them being the `go.sum` file. This is a database of the expected cryptographic checksums of all of your dependencies, including transitive dependencies.
   51 
   52 [Hugo Modules](/hugo-modules/) is a feature built on top of the functionality of Go Modules. Like Go Modules, a Hugo project using Hugo Modules will have a `go.sum` file. We recommend that you commit this file to your version control system. The Hugo build will fail if there is a checksum mismatch, which would be an indication of [dependency tampering](https://julienrenaux.fr/2019/12/20/github-actions-security-risk/).
   53 
   54 ## Web Application Security
   55 
   56 These are the security threats as defined by [OWASP](https://en.wikipedia.org/wiki/OWASP).
   57 
   58 For HTML output, this is the core security model:
   59 
   60 https://golang.org/pkg/html/template/#hdr-Security_Model
   61 
   62 In short:
   63 
   64 Templates authors (you) are trusted, but the data you send in is not.
   65 This is why you sometimes need to use the _safe_ functions, such as `safeHTML`, to avoid escaping of data you know is safe.
   66 There is one exception to the above, as noted in the documentation: If you enable inline shortcodes, you also say that the shortcodes and data handling in content files are trusted, as those macros are treated as pure text.
   67 It may be worth adding that Hugo is a static site generator with no concept of dynamic user input.
   68 
   69 For content, the default Markdown renderer is [configured](/getting-started/configuration-markup) to remove or escape potentially unsafe content. This behavior can be reconfigured if you trust your content.