Prevents directory traversal in Supabase Storage via path validation functions and storage RLS.
97
97%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
.., ./, or // to pass validation. Any such path MUST be rejected immediately.storage.objects MUST enforce auth.uid() scoping.public: true when it holds tenant-specific data. HALT and ask the operator before proceeding.SECURITY INVOKER for the path validation function. It MUST be SECURITY DEFINER.storage.validate_path().{tenant_id}/{category}/{filename} pattern. Flat or unscoped layouts are forbidden.storage.validate_path function MUST be idempotent -- re-running the migration MUST NOT produce errors or duplicate objects.