Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Totally agree! Although I'm one of the contributors to that repo as well, the sheer number of possible attack vectors on the JWT scheme means that I was reluctant to use it in a publicly-facing use case. Let me know how it goes!


What are your biggest concerns about the Pg/Hasura JWT approach (which particular attack vectors made you nervous)?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: