If I use popular packages for my application, I think that a hacker can try to access the exports of the packages by using Web Console, and I think it will be very big problem in terms of security.
@Steve I’m not certainly sure, but for example, making the app strangely by controlling(add or remove attribute) the properties of the exports. Isn’t it possible ?
A user will always be able to change client side code to break their application. But this won’t effect the server or other clients. There would only be a security issue if the library way exposing an API key or similar info, but as long as you keep these in the server directory this isn’t an issue.
I think it’s up to the dev to check for security faults - is that not true any time you’d use third-party code? And that goes for non-Meteor applications too.
As far as I know, there is no security issue pertaining to Meteor package system. @barkbaek, unless you give an example, there is not much we can discuss.
If you use a lot of community packages in your app, there is the possibility that one of them will add an allow function that returns true for a perfectly good reason, but if you are not aware of it, you may not even realize that your allow function is never being called, and your security logic is not being applied.
This package takes allow functions out of the equation and handles all security through deny functions, which are guaranteed to be called.