Skip to content

Signed URLs - Preventing attackers #221

Closed
@abhisheksoni27

Description

@abhisheksoni27

Is it possible to use Signed URLs or a query parameter that can be passed and verified by Lambda? I am aware this is possible if I were to directly serve the image via S3.

If it is not possible, what do you recommend any potential business to do, so that their image keys are not left in the open?

Even if we make the keys as such they are non-iterable, it still cannot prevent a potential attacker to issue multiple requests to the same resource but with varying types of edits.

I suppose each edit will cost us a GET Request, and consequently hog our Billing statement.

What's the best practice that you guys are following/recommend?

If possible, I'd love to work on this and contribute.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions