security: reject common/weak passwords on every set-password path (#31)
CI / Architecture Guardrails (pull_request) Successful in 6m31s
CI / Typecheck (pull_request) Failing after 6m9s
CI / Build (pull_request) Has been skipped
CI / E2E Tests (pull_request) Has been skipped
CI / Fresh-Linux Docker Deploy (pull_request) Has been skipped
CI / Assistant Split Regression (pull_request) Successful in 7m23s
CI / Lint (pull_request) Successful in 6m54s
CI / Unit Tests (pull_request) Successful in 9m28s
CI / Release Images (pull_request) Has been skipped

Adds a synchronous policy check that blocks (1) the curated >=12-char
common-password list (rockyou top, predictable seasonal, admin defaults),
(2) trivial patterns (single-char repeat, short-pattern repeat, keyboard
or numeric sequences), and (3) passwords containing the user's email
local-part or any name component. Wired into all five password-mutation
sites: first-admin setup, admin createUser/setUserPassword, invite
acceptance, and password-reset.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
This commit is contained in:
2026-04-18 14:02:43 +02:00
parent d9a7ec0338
commit e01074926e
8 changed files with 359 additions and 0 deletions
+8
View File
@@ -5,6 +5,7 @@ import {
PASSWORD_MAX_LENGTH,
PASSWORD_MIN_LENGTH,
PASSWORD_POLICY_MESSAGE,
checkPasswordPolicy,
} from "@capakraken/shared";
export type SetupResult =
@@ -26,6 +27,13 @@ export async function createFirstAdmin(formData: {
) {
return { error: "validation", message: PASSWORD_POLICY_MESSAGE };
}
const policy = checkPasswordPolicy(formData.password, {
email: formData.email,
name: formData.name,
});
if (!policy.ok) {
return { error: "validation", message: policy.reason };
}
// TOCTOU guard — check again inside the action
const count = await prisma.user.count();
+12
View File
@@ -3,6 +3,7 @@ import {
PASSWORD_MAX_LENGTH,
PASSWORD_MIN_LENGTH,
PASSWORD_POLICY_MESSAGE,
checkPasswordPolicy,
} from "@capakraken/shared";
import { TRPCError } from "@trpc/server";
import { z } from "zod";
@@ -133,6 +134,17 @@ export const authRouter = createTRPCRouter({
});
}
// Reject weak/common/identity-related passwords *after* the token is
// validated so attackers can't probe the policy without a valid link.
const userForPolicy = await ctx.db.user.findUnique({
where: { email: record.email },
select: { email: true, name: true },
});
const policy = checkPasswordPolicy(input.password, userForPolicy ?? undefined);
if (!policy.ok) {
throw new TRPCError({ code: "BAD_REQUEST", message: policy.reason });
}
const { hash } = await import("@node-rs/argon2");
const passwordHash = await hash(input.password);
+6
View File
@@ -6,6 +6,7 @@ import {
PASSWORD_MAX_LENGTH,
PASSWORD_MIN_LENGTH,
PASSWORD_POLICY_MESSAGE,
checkPasswordPolicy,
} from "@capakraken/shared";
import { createTRPCRouter, adminProcedure, publicProcedure } from "../trpc.js";
import { getAppBaseUrl } from "../lib/app-base-url.js";
@@ -155,6 +156,11 @@ export const inviteRouter = createTRPCRouter({
});
}
const policy = checkPasswordPolicy(input.password, { email: invite.email });
if (!policy.ok) {
throw new TRPCError({ code: "BAD_REQUEST", message: policy.reason });
}
const { hash } = await import("@node-rs/argon2");
const passwordHash = await hash(input.password);
@@ -3,6 +3,7 @@ import {
PASSWORD_MAX_LENGTH,
PASSWORD_MIN_LENGTH,
PASSWORD_POLICY_MESSAGE,
checkPasswordPolicy,
} from "@capakraken/shared";
import { PermissionOverrides, SystemRole, resolvePermissions } from "@capakraken/shared/types";
import { TRPCError } from "@trpc/server";
@@ -121,6 +122,11 @@ export async function createUser(
throw new TRPCError({ code: "CONFLICT", message: "User with this email already exists" });
}
const policy = checkPasswordPolicy(input.password, { email: input.email, name: input.name });
if (!policy.ok) {
throw new TRPCError({ code: "BAD_REQUEST", message: policy.reason });
}
const { hash } = await import("@node-rs/argon2");
const passwordHash = await hash(input.password);
@@ -169,6 +175,11 @@ export async function setUserPassword(
"User",
);
const policy = checkPasswordPolicy(input.password, { email: user.email, name: user.name });
if (!policy.ok) {
throw new TRPCError({ code: "BAD_REQUEST", message: policy.reason });
}
const { hash } = await import("@node-rs/argon2");
const passwordHash = await hash(input.password);
@@ -0,0 +1,114 @@
import { describe, expect, it } from "vitest";
import { checkPasswordPolicy } from "../security/password-policy.js";
describe("checkPasswordPolicy", () => {
describe("length bounds", () => {
it("rejects passwords shorter than 12 chars", () => {
const result = checkPasswordPolicy("short1!");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/at least 12/i);
});
it("rejects passwords longer than 128 chars", () => {
const result = checkPasswordPolicy("A".repeat(129));
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/no more than 128/i);
});
it("accepts passwords at the lower bound that pass other checks", () => {
const result = checkPasswordPolicy("Tr0ub4dor&3!"); // 12 chars, varied
expect(result.ok).toBe(true);
});
});
describe("trivial patterns", () => {
it("rejects single char repeated", () => {
const result = checkPasswordPolicy("aaaaaaaaaaaa");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/single character/i);
});
it("rejects short patterns repeated", () => {
const result = checkPasswordPolicy("abcabcabcabc");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/short pattern/i);
});
it("rejects '1212121212121212' (2-char pattern repeated)", () => {
const result = checkPasswordPolicy("1212121212121212");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/short pattern/i);
});
it("rejects keyboard sequences like 'abcdefghijkl'", () => {
const result = checkPasswordPolicy("abcdefghijkl");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/sequence/i);
});
it("rejects numeric runs like '1234567890ab'", () => {
const result = checkPasswordPolicy("1234567890ab");
// Either matches blacklist or sequence detector — both rejections OK.
expect(result.ok).toBe(false);
});
});
describe("common-password blacklist", () => {
it("rejects 'PasswordPassword' (case-insensitive)", () => {
const result = checkPasswordPolicy("PasswordPassword");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/commonly used/i);
});
it("rejects 'Welcome2026!' seasonal password", () => {
const result = checkPasswordPolicy("Welcome2026!");
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/commonly used/i);
});
it("rejects 'Summer2025!' regardless of case", () => {
const result = checkPasswordPolicy("SUMMER2025!");
expect(result.ok).toBe(false);
});
});
describe("identity inclusion", () => {
it("rejects passwords containing the email local-part", () => {
const result = checkPasswordPolicy("hartmutSomePass1", {
email: "hartmut@example.com",
});
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/email or name/i);
});
it("rejects passwords containing the user name", () => {
const result = checkPasswordPolicy("MyHartmutPass1!", {
name: "Hartmut Noerenberg",
});
expect(result.ok).toBe(false);
expect(result.reason).toMatch(/email or name/i);
});
it("ignores short email locals to avoid false positives", () => {
const result = checkPasswordPolicy("XyZmagic12345!", { email: "x@example.com" });
expect(result.ok).toBe(true);
});
it("ignores short names (<4 chars)", () => {
const result = checkPasswordPolicy("XyZmagic12345!", { name: "Ed" });
expect(result.ok).toBe(true);
});
});
describe("strong passwords", () => {
it("accepts a 16-char random-looking passphrase", () => {
const result = checkPasswordPolicy("Tr0ub4d0r&3-x9Q!");
expect(result.ok).toBe(true);
});
it("accepts diceware-style passphrase", () => {
const result = checkPasswordPolicy("correct-horse-battery-staple-7!");
expect(result.ok).toBe(true);
});
});
});
+1
View File
@@ -1,3 +1,4 @@
export * from "./types/index.js";
export * from "./schemas/index.js";
export * from "./constants/index.js";
export * from "./security/index.js";
+1
View File
@@ -0,0 +1 @@
export * from "./password-policy.js";
@@ -0,0 +1,206 @@
import {
PASSWORD_MAX_LENGTH,
PASSWORD_MIN_LENGTH,
PASSWORD_POLICY_MESSAGE,
} from "../constants/index.js";
export interface PasswordContext {
email?: string | null;
name?: string | null;
}
export type PasswordCheckResult = { ok: true } | { ok: false; reason: string };
// Curated list of >=12-char passwords that pass the length gate but are
// known weak (rockyou top entries, predictable seasonal patterns, common
// admin defaults). Stored lower-cased for case-insensitive matching. The
// vast majority of weak passwords are <12 chars and already rejected by
// length, so this list focuses on what would otherwise *pass* min-length.
const COMMON_PASSWORDS: ReadonlySet<string> = new Set([
"passwordpassword",
"password1234",
"password12345",
"password123456",
"password1234567",
"passwordpassword1",
"passw0rdpassw0rd",
"1234567890ab",
"1234567890abc",
"12345678901",
"123456789012",
"1234567891234",
"qwertyuiop12",
"qwertyuiop123",
"qwertyuiop1234",
"qwertyuiopas",
"asdfghjkl123",
"asdfghjkl1234",
"iloveyou1234",
"iloveyou12345",
"iloveyouabc1",
"iloveyouforever",
"ilovemybabies",
"letmein123456",
"letmein12345",
"welcome12345",
"welcome123456",
"welcome1234567",
"admin1234567",
"admin12345678",
"administrator1",
"administrator123",
"changeme1234",
"changeme12345",
"default1234567",
"football1234",
"baseball1234",
"trustno112345",
"summer2023!",
"summer2024!",
"summer2025!",
"summer2026!",
"winter2023!",
"winter2024!",
"winter2025!",
"winter2026!",
"spring2023!",
"spring2024!",
"spring2025!",
"spring2026!",
"autumn2023!",
"autumn2024!",
"autumn2025!",
"autumn2026!",
"welcome2023!",
"welcome2024!",
"welcome2025!",
"welcome2026!",
"password2023!",
"password2024!",
"password2025!",
"password2026!",
"p@ssw0rd1234",
"p@ssword1234",
]);
function isSingleCharRepeated(pw: string): boolean {
if (pw.length === 0) return false;
const first = pw[0]!;
for (let i = 1; i < pw.length; i++) {
if (pw[i] !== first) return false;
}
return true;
}
// Detect monotonically +/-1 character runs. A password where >=60% of
// characters belong to a run of length >=5 (e.g. "abcdefgh1234") is
// rejected as a keyboard / numeric sequence. The 60% threshold lets
// passwords with a sequential prefix and a long random suffix pass.
function isSequentialPassword(pw: string): boolean {
if (pw.length < 8) return false;
const lower = pw.toLowerCase();
let runChars = 0;
let i = 0;
while (i < lower.length) {
let runLen = 1;
while (i + runLen < lower.length) {
const delta = lower.charCodeAt(i + runLen) - lower.charCodeAt(i + runLen - 1);
if (delta === 1 || delta === -1) {
runLen++;
} else {
break;
}
}
if (runLen >= 5) runChars += runLen;
i += runLen;
}
return runChars * 100 >= lower.length * 60;
}
// Reject passwords that are a 2-6 char pattern repeated >=3 times
// (e.g. "abcabcabcabc", "12121212"). Length divisibility check first
// keeps the constant-factor work tiny.
function isShortPatternRepeated(pw: string): boolean {
for (let patLen = 2; patLen <= 6; patLen++) {
if (pw.length % patLen !== 0) continue;
const repeats = pw.length / patLen;
if (repeats < 3) continue;
const pattern = pw.slice(0, patLen);
let allMatch = true;
for (let r = 1; r < repeats; r++) {
if (pw.slice(r * patLen, (r + 1) * patLen) !== pattern) {
allMatch = false;
break;
}
}
if (allMatch) return true;
}
return false;
}
// Substrings shorter than 4 chars are ignored: short names ("ed") or
// generic email locals ("ab") would otherwise reject too many legitimate
// passwords by coincidence.
function containsIdentity(pw: string, ctx: PasswordContext | undefined): boolean {
if (!ctx) return false;
const lower = pw.toLowerCase();
if (ctx.email) {
const local = ctx.email.split("@")[0]?.toLowerCase().trim() ?? "";
if (local.length >= 4 && lower.includes(local)) return true;
}
if (ctx.name) {
const lowered = ctx.name.toLowerCase().trim();
const fullNoSpaces = lowered.replace(/\s+/g, "");
if (fullNoSpaces.length >= 4 && lower.includes(fullNoSpaces)) return true;
// Also reject if the password embeds an individual name component
// (e.g. given-name or surname). "Hartmut Noerenberg" → check both
// "hartmut" and "noerenberg" so a password like "MyHartmutPass1!"
// is rejected, not only the unrealistic "MyHartmutNoerenbergPass1!".
for (const part of lowered.split(/\s+/)) {
if (part.length >= 4 && lower.includes(part)) return true;
}
}
return false;
}
/**
* Validate a password against the policy. Pure synchronous function so it
* can be called from server (tRPC mutations, server actions) and client
* (pre-submit validation) with identical results.
*/
export function checkPasswordPolicy(password: string, ctx?: PasswordContext): PasswordCheckResult {
if (password.length < PASSWORD_MIN_LENGTH) {
return { ok: false, reason: PASSWORD_POLICY_MESSAGE };
}
if (password.length > PASSWORD_MAX_LENGTH) {
return {
ok: false,
reason: `Password must be no more than ${PASSWORD_MAX_LENGTH} characters.`,
};
}
if (isSingleCharRepeated(password)) {
return { ok: false, reason: "Password must not be a single character repeated." };
}
if (isShortPatternRepeated(password)) {
return { ok: false, reason: "Password must not be a short pattern repeated." };
}
if (isSequentialPassword(password)) {
return {
ok: false,
reason: "Password must not be a keyboard or numeric sequence.",
};
}
if (COMMON_PASSWORDS.has(password.toLowerCase())) {
return {
ok: false,
reason: "Password is in the list of commonly used or breached passwords.",
};
}
if (containsIdentity(password, ctx)) {
return {
ok: false,
reason: "Password must not contain your email or name.",
};
}
return { ok: true };
}