security: cap assistant chat payload + injection-guard project cover prompt (#38)

`messages[].content` and `pageContext` had no `.max()` — a single chat
turn could ship 50 MB / 200 messages and OOM JSON.parse, balloon prompt
assembly, and burn arbitrary AI-provider cost. Separately, the
project-cover image-generation path concatenated user free-text into
the DALL-E / Gemini prompt without any injection check, so a manager
could pivot the image model into "ignore previous instructions" /
role-override style attacks against downstream prompt-aware infra.

- assistant-procedure-support: add `.max(10_000)` per message,
  `.max(2_000)` on pageContext, and a `.superRefine` aggregate cap
  (200 KB total bytes across all messages + page context). Constants
  exported so call sites and tests share one source of truth.
- project-cover.generateCover: run `checkPromptInjection` over the
  user-supplied `prompt` field; reject with BAD_REQUEST on match.
- 7 schema-bound tests covering per-message, page-context, aggregate,
  message-count, and happy-path cases.

Covers EAPPS 3.2.7 (input bounds) / EGAI 4.6.3.2 (prompt-injection
detection on user inputs).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
This commit is contained in:
2026-04-17 08:46:03 +02:00
parent c0c5f762b8
commit c0ea1d0cb9
3 changed files with 160 additions and 46 deletions
@@ -0,0 +1,71 @@
import { describe, expect, it } from "vitest";
import {
ASSISTANT_MAX_AGGREGATE_BYTES,
ASSISTANT_MAX_CONTENT_LENGTH,
ASSISTANT_MAX_PAGE_CONTEXT,
assistantChatInputSchema,
} from "../router/assistant-procedure-support.js";
describe("assistantChatInputSchema bounds", () => {
it("accepts a normal-sized message", () => {
const result = assistantChatInputSchema.safeParse({
messages: [{ role: "user", content: "Hello" }],
});
expect(result.success).toBe(true);
});
it("rejects a single message above the per-message length cap", () => {
const huge = "x".repeat(ASSISTANT_MAX_CONTENT_LENGTH + 1);
const result = assistantChatInputSchema.safeParse({
messages: [{ role: "user", content: huge }],
});
expect(result.success).toBe(false);
});
it("rejects a pageContext above the page-context cap", () => {
const huge = "x".repeat(ASSISTANT_MAX_PAGE_CONTEXT + 1);
const result = assistantChatInputSchema.safeParse({
messages: [{ role: "user", content: "Hi" }],
pageContext: huge,
});
expect(result.success).toBe(false);
});
it("rejects an aggregate payload above the total-bytes cap", () => {
// Each message is below the per-message cap, but together they exceed
// the aggregate cap.
const oneMessageBytes = 5_000;
const each = "x".repeat(oneMessageBytes);
const count = Math.ceil(ASSISTANT_MAX_AGGREGATE_BYTES / oneMessageBytes) + 2;
const messages = Array.from({ length: count }, () => ({
role: "user" as const,
content: each,
}));
const result = assistantChatInputSchema.safeParse({ messages });
expect(result.success).toBe(false);
});
it("accepts an aggregate payload right under the cap", () => {
const count = Math.floor(ASSISTANT_MAX_AGGREGATE_BYTES / 1_000) - 1;
const messages = Array.from({ length: count }, () => ({
role: "user" as const,
content: "x".repeat(1_000),
}));
const result = assistantChatInputSchema.safeParse({ messages });
expect(result.success).toBe(true);
});
it("rejects an empty messages array", () => {
const result = assistantChatInputSchema.safeParse({ messages: [] });
expect(result.success).toBe(false);
});
it("rejects more than 200 messages", () => {
const messages = Array.from({ length: 201 }, () => ({
role: "user" as const,
content: "x",
}));
const result = assistantChatInputSchema.safeParse({ messages });
expect(result.success).toBe(false);
});
});
@@ -34,24 +34,47 @@ import {
const MAX_TOOL_ITERATIONS = 8;
type AssistantProcedureContext = Pick<
TRPCContext,
"db" | "dbUser" | "roleDefaults" | "session"
>;
type AssistantProcedureContext = Pick<TRPCContext, "db" | "dbUser" | "roleDefaults" | "session">;
type OpenAiMessage = {
role: "system" | "user" | "assistant";
content: string;
};
export const assistantChatInputSchema = z.object({
messages: z.array(z.object({
role: z.enum(["user", "assistant"]),
content: z.string(),
})).min(1).max(200),
pageContext: z.string().optional(),
conversationId: z.string().max(120).optional(),
});
// Per-message and aggregate caps. The per-message cap stops a single 50 MB
// payload from OOM-ing JSON.parse / blowing up the prompt assembly; the
// aggregate cap stops the same with 200 messages × 9 999 chars each.
// 10 000 chars is generous for normal chat, 200 KB total is comfortably under
// any provider's request-budget.
export const ASSISTANT_MAX_CONTENT_LENGTH = 10_000;
export const ASSISTANT_MAX_PAGE_CONTEXT = 2_000;
export const ASSISTANT_MAX_AGGREGATE_BYTES = 200_000;
export const assistantChatInputSchema = z
.object({
messages: z
.array(
z.object({
role: z.enum(["user", "assistant"]),
content: z.string().max(ASSISTANT_MAX_CONTENT_LENGTH),
}),
)
.min(1)
.max(200),
pageContext: z.string().max(ASSISTANT_MAX_PAGE_CONTEXT).optional(),
conversationId: z.string().max(120).optional(),
})
.superRefine((val, ctx) => {
let total = 0;
for (const m of val.messages) total += Buffer.byteLength(m.content, "utf8");
if (val.pageContext) total += Buffer.byteLength(val.pageContext, "utf8");
if (total > ASSISTANT_MAX_AGGREGATE_BYTES) {
ctx.addIssue({
code: z.ZodIssueCode.custom,
message: `Aggregate message payload too large (${total} bytes > ${ASSISTANT_MAX_AGGREGATE_BYTES})`,
});
}
});
type AssistantChatInput = z.infer<typeof assistantChatInputSchema>;
@@ -70,14 +93,13 @@ function buildAssistantContextBlock(input: {
pageContext?: string | undefined;
}) {
const permissionList = [...input.permissions];
let contextBlock =
`\n\nAktueller User: ${input.session?.user?.name ?? "Unknown"} (Rolle: ${input.userRole})`;
contextBlock +=
`\nBerechtigungen: ${permissionList.length > 0 ? permissionList.join(", ") : "Nur Lese-Zugriff auf eigene Daten"}`;
let contextBlock = `\n\nAktueller User: ${input.session?.user?.name ?? "Unknown"} (Rolle: ${input.userRole})`;
contextBlock += `\nBerechtigungen: ${permissionList.length > 0 ? permissionList.join(", ") : "Nur Lese-Zugriff auf eigene Daten"}`;
if (input.pageContext) {
contextBlock += `\nAktuelle Seite: ${input.pageContext}`;
contextBlock += "\nHinweis: Beziehe dich bevorzugt auf den Kontext der aktuellen Seite wenn die Frage des Users dazu passt.";
contextBlock +=
"\nHinweis: Beziehe dich bevorzugt auf den Kontext der aktuellen Seite wenn die Frage des Users dazu passt.";
}
return contextBlock;
@@ -94,8 +116,8 @@ function buildOpenAiMessages(input: {
{
role: "system",
content:
ASSISTANT_SYSTEM_PROMPT
+ buildAssistantContextBlock({
ASSISTANT_SYSTEM_PROMPT +
buildAssistantContextBlock({
session: input.session,
userRole: input.userRole,
permissions: input.permissions,
@@ -155,10 +177,7 @@ export async function listPendingApprovalPayloads(ctx: AssistantProcedureContext
return approvals.map((approval) => toApprovalPayload(approval, "pending"));
}
export async function runAssistantChat(
ctx: AssistantProcedureContext,
input: AssistantChatInput,
) {
export async function runAssistantChat(ctx: AssistantProcedureContext, input: AssistantChatInput) {
const dbUser = requireAssistantUser(ctx);
const configuredSettings = await ctx.db.systemSettings.findUnique({
where: { id: "singleton" },
+47 -23
View File
@@ -5,6 +5,7 @@ import { createDalleClient, isDalleConfigured, loggedAiCall, parseAiError } from
import { findUniqueOrThrow } from "../db/helpers.js";
import { generateGeminiImage, isGeminiConfigured, parseGeminiError } from "../gemini-client.js";
import { validateImageDataUrl } from "../lib/image-validation.js";
import { checkPromptInjection } from "../lib/prompt-guard.js";
import { resolveSystemSettingsRuntime } from "../lib/system-settings-runtime.js";
import { managerProcedure, protectedProcedure, requirePermission } from "../trpc.js";
@@ -19,9 +20,8 @@ async function readImageGenerationStatus(db: {
where: { id: "singleton" },
});
const imageProvider = settings?.["imageProvider"] === "gemini" ? "gemini" : "dalle";
const configured = imageProvider === "gemini"
? isGeminiConfigured(settings)
: isDalleConfigured(settings);
const configured =
imageProvider === "gemini" ? isGeminiConfigured(settings) : isDalleConfigured(settings);
return {
configured,
@@ -31,13 +31,30 @@ async function readImageGenerationStatus(db: {
export const projectCoverProcedures = {
generateCover: managerProcedure
.input(z.object({
projectId: z.string(),
prompt: z.string().max(500).optional(),
}))
.input(
z.object({
projectId: z.string(),
prompt: z.string().max(500).optional(),
}),
)
.mutation(async ({ ctx, input }) => {
requirePermission(ctx, PermissionKey.MANAGE_PROJECTS);
// The user's free-text "Additional direction" is concatenated into the
// image-generation prompt. Run the same injection guard we apply to
// assistant chat (EGAI 4.6.3.2) so a manager-role user can't pivot the
// image model into "ignore previous instructions" / role-override
// attacks against downstream prompt-aware infra.
if (input.prompt) {
const guard = checkPromptInjection(input.prompt);
if (!guard.safe) {
throw new TRPCError({
code: "BAD_REQUEST",
message: "Prompt rejected: contains an injection pattern.",
});
}
}
const project = await findUniqueOrThrow(
ctx.db.project.findUnique({
where: { id: input.projectId },
@@ -85,7 +102,10 @@ export const projectCoverProcedures = {
}
} else {
const dalleClient = createDalleClient(runtimeSettings);
const model = runtimeSettings.aiProvider === "azure" ? runtimeSettings.azureDalleDeployment! : "dall-e-3";
const model =
runtimeSettings.aiProvider === "azure"
? runtimeSettings.azureDalleDeployment!
: "dall-e-3";
// eslint-disable-next-line @typescript-eslint/no-explicit-any
let response: any;
@@ -126,10 +146,12 @@ export const projectCoverProcedures = {
}),
uploadCover: managerProcedure
.input(z.object({
projectId: z.string(),
imageDataUrl: z.string(),
}))
.input(
z.object({
projectId: z.string(),
imageDataUrl: z.string(),
}),
)
.mutation(async ({ ctx, input }) => {
requirePermission(ctx, PermissionKey.MANAGE_PROJECTS);
@@ -187,10 +209,12 @@ export const projectCoverProcedures = {
}),
updateCoverFocus: managerProcedure
.input(z.object({
projectId: z.string(),
coverFocusY: z.number().int().min(0).max(100),
}))
.input(
z.object({
projectId: z.string(),
coverFocusY: z.number().int().min(0).max(100),
}),
)
.mutation(async ({ ctx, input }) => {
requirePermission(ctx, PermissionKey.MANAGE_PROJECTS);
await ctx.db.project.update({
@@ -200,13 +224,13 @@ export const projectCoverProcedures = {
return { ok: true };
}),
isImageGenConfigured: protectedProcedure
.query(async ({ ctx }) => readImageGenerationStatus(ctx.db)),
isImageGenConfigured: protectedProcedure.query(async ({ ctx }) =>
readImageGenerationStatus(ctx.db),
),
/** @deprecated Use isImageGenConfigured instead */
isDalleConfigured: protectedProcedure
.query(async ({ ctx }) => {
const { configured } = await readImageGenerationStatus(ctx.db);
return { configured };
}),
isDalleConfigured: protectedProcedure.query(async ({ ctx }) => {
const { configured } = await readImageGenerationStatus(ctx.db);
return { configured };
}),
};