Security Compliance

Security compliance covers the foundational safeguards every recipe and guideline must observe — authentication, authorization, transport encryption, input handling, secret management, and dependency hygiene. These checks ensure that implementations meet baseline security expectations across all platforms.

Applicability

This category applies to any recipe or guideline that handles user credentials, secrets, network communication, user input, dependencies, or web content delivery. If a recipe touches authentication, stores sensitive data, accepts external input, or serves content over HTTP, it falls within scope.

Checks

secure-authentication

Authentication MUST use OAuth 2.0/OIDC with PKCE for all public clients.

Applies when: recipe implements or integrates an authentication flow.

Guidelines:


server-side-authorization

Authorization MUST be enforced server-side, never client-only.

Applies when: recipe includes authorization logic or role-based access control.

Guidelines:


secure-storage

Secrets and credentials MUST use platform-specific secure storage (Keychain, EncryptedSharedPreferences, DPAPI).

Applies when: recipe stores tokens, passwords, API keys, or other sensitive material.

Guidelines:


input-sanitization

All user input MUST be validated and sanitized before processing.

Applies when: recipe accepts user input in any form (text fields, file uploads, query parameters, deep links).

Guidelines:


secure-transport

All network communication MUST use TLS 1.2 or higher.

Applies when: recipe makes or receives network requests.

Guidelines:


secure-log-output

Log messages MUST NOT contain credentials, tokens, or PII.

Applies when: recipe produces log output or diagnostic messages.

Guidelines:


token-lifecycle

Access tokens MUST be short-lived (5-15 min) with refresh token rotation.

Applies when: recipe issues, stores, or refreshes access tokens.

Guidelines:


dependency-scanning

Dependencies MUST be scanned for known vulnerabilities before release.

Applies when: recipe introduces or relies on third-party dependencies.

Guidelines:


security-headers

Web responses MUST include standard security headers (HSTS, CSP, X-Content-Type-Options).

Applies when: recipe serves web content or defines HTTP responses.

Guidelines:


content-security-policy

Web content MUST enforce a strict Content Security Policy.

Applies when: recipe renders HTML or loads external resources in a web context.

Guidelines:


cors-allowlist

CORS MUST use explicit origin allowlists, never wildcards with credentials.

Applies when: recipe configures cross-origin resource sharing.

Guidelines:


security-testing

Verification MUST include static analysis (SAST) and dependency scanning.

Applies when: recipe defines a verification or CI pipeline.

Guidelines:

version
1.0.0
status
draft
tags
compliance, security
author
Mike Fullerton
modified
2026-03-28

Change History

Version Date Author Summary
1.0.0 2026-03-28 Mike Fullerton Initial creation