Enhancing Security with Deno #2801
AlexBryner
started this conversation in
Ideas
Replies: 1 comment 4 replies
-
Is the primary concern "what can the CLI do to/with Salesforce orgs" ? [that seems more easily solvable using Salesforce's security features than by trying to block/restrict URL patterns within the CLI]. Ex: if you don't need user creation or access to certain records, don't put that in the permset/profile you're using for the CLI's user? Can you describe some example problems or threat vectors and how Deno's permissions features would help with those? |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'd like to initiate a discussion on adopting Deno within the CLI, primarily because of its intentional focus on security enhancements. Deno aims to mitigate a wide range of vulnerabilities encountered when running open-source JavaScript dependencies and plugins within Node.js. Node.js is introducing experimental security flags, which show promise, but these enhancements still do not offer the comprehensive controls that Deno does, and network access controls don't seem to be on the roadmap. Whether used locally or in a deploy pipeline, the tool is granted significant access to Salesforce with its privileged credentials across environments—whether it's accessing data, performing file system operations, executing Apex code, creating users, or generating credentials. With this in mind, it feels like the significance of having robust security controls built into the tool increases alongside its growing utility and adoption.
Beta Was this translation helpful? Give feedback.
All reactions