12. Storing JWTs

Storing JWTs

Using Javascript to Store JWTs

ND004 C03 L02 A09.2 Local Storage

Using Local Store

QUESTION:

We've stored a value in the localStore on the following site:
https://udacity.github.io/FSND/LocalStore/

Go to the above page and use the browser dev tools (either console or application storage) to find the value to the key concept_quiz_keyword . Copy and paste this value into this quiz!

SOLUTION:

NOTE: The solutions are expressed in RegEx pattern. Udacity uses these patterns to check the given answer

Security Considerations of Local Storage

What could go wrong?

ND004 C03 L02 A10.1 Security Considerations Of Local Storage

How Cross-Site Scripting Attacks (XSS) are Performed and Mitigated Techniques

ND004 C03 L02 A10.2 Security Considerations Of Local Storage V3

In this video, we discuss Input Sanitation . To clarify this concept, imagine a user submits HTML as part of their name in a form. When you later pull this information from your database and insert it into the HTML template for the website, the browser engine will render this text on the page. However, if the text contains HTML like <b>Gabe</b> this would be interpreted in the browser as HTML and render as Gabe . This becomes a problem if malicious code, such as javascript, is saved in place of a valid string. In other words, this malicious text will be interpreted by the browser as code and executed on the client. Input Sanitation transforms characters like < to &lt; which will not be interpreted as code and print as text (<). This step should always be performed on the server to prevent someone from sending the malicious text directly to your server using curl or Postman .

We also mentioned NPM or Node Package Manager this is an online database of publicly submitted libraries you can use in your javascript projects. Other public databases of code libraries such as PIP for Python or Brew for Mac . Some care should be taken to ensure that these packages are compliant with your license and security policies and are monitored for security vulnerabilities.

Additional Reading

Security Considerations of Local Storage

Alternatives to LocalStorage