Skip to content

docs: add section about how to disable path based apps to security best practices #18419

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

EdwardAngert
Copy link
Contributor

add a new section specifically about how to disable path-based apps to the security best practices doc

todo

  • copy review
  • cross-linking

@EdwardAngert EdwardAngert self-assigned this Jun 17, 2025
@EdwardAngert EdwardAngert added the docs Area: coder.com/docs label Jun 17, 2025
@@ -60,6 +60,8 @@ If you are providing TLS certificates directly to the Coder server, either
options (these both take a comma separated list of files; list certificates
and their respective keys in the same order).

After you enable a wildcard sub-domain, [disable path-based apps](../../tutorials/best-practices/security-best-practices.md#disable-path-based-apps).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"After you configure the wildcard access URL, we recommend disabling path-based apps for security."

@@ -66,6 +66,31 @@ logs (which have `msg: audit_log`) and retain them for a minimum of two years
If a security incident with Coder does occur, audit logs are invaluable in
determining the nature and scope of the impact.

### Disable path-based apps

For production deployments, disable path-based apps.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"For production deployments, we recommend disable path-based apps after you've configured a wildcard access URL.

Comment on lines +87 to +89
By default, Coder mitigates the impact of having path-based apps enabled, but we still recommend disabling it to prevent malicious workspaces accessing other workspaces owned by the same user or performing requests against the Coder API.

If you do keep path-based apps enabled, Coder limits the risk:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You say both "Coder mitigates the impact" and "Coder limits the risk". You should probably just remove the "Coder limits the risk" line IMO.

Comment on lines +73 to +75
Path-based apps share the same origin as the Coder API.
This setup is convenient for demos, but can expose the deployment to cross-site-scripting (XSS) attacks in production.
A malicious workspace could reuse Coder cookies to call the API or interact with other workspaces owned by the same user.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Path-based apps share the same origin as the Coder API, which can be convenient for trialing Coder, but can expose the deployment to cross-site-scripting (XSS) attacks in production.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs Area: coder.com/docs
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants