Agent-skills-standard nextjs-security
Secure Next.js App Router with middleware auth, Server Action validation, CSP headers, and taint APIs. Use when adding authentication middleware, validating Server Action inputs with Zod, or preventing secret leakage to client bundles. (triggers: app/**/actions.ts, middleware.ts, action, boundary, sanitize, auth, jose)
install
source · Clone the upstream repo
git clone https://github.com/HoangNguyen0403/agent-skills-standard
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/HoangNguyen0403/agent-skills-standard "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/nextjs/nextjs-security" ~/.claude/skills/hoangnguyen0403-agent-skills-standard-nextjs-security && rm -rf "$T"
manifest:
skills/nextjs/nextjs-security/SKILL.mdsource content
Next.js Security
Priority: P0 (CRITICAL)
Workflow: Secure Next.js App
- Add auth middleware — Create
to verify JWT/session on protected routes.middleware.ts - Validate Server Actions — Parse all inputs with Zod schemas; call
first.await auth() - Set security headers — Add CSP, HSTS, X-Frame-Options in middleware response.
- Use
— Import in modules containing secrets to prevent client bundling.server-only - Taint sensitive objects — Use
to block server objects from reaching client.taintObjectReference
Secure Server Action Example
Implementation Guidelines
- Next.js Middleware: Use
for edge-side authentication, role-based access control (RBAC), and enforcing Security Headers (e.g.,middleware.ts
,Content-Security-Policy (CSP)
).X-XSS-Protection - Server Actions: Always sanitize all inputs from
or JSON using Zod. Perform authentication checks (FormData
) inside every action to verify caller.await auth() - Data Tainting: Use
API (experimental_taint
) to ensure sensitive server objects (e.g., User withtaintObjectReference
) never leak into Client Component.passwordHash - Route Handlers (
): Implement rate limiting to prevent brute-force or DoS attacks. Verify Origin/Referer headers to mitigate CSRF (Cross-Site Request Forgery).route.ts - Auth Tokens: strictly use
,HttpOnly
cookies withSecure
for session management. Never store tokens inSameSite: 'Lax'
.localStorage - Logic Isolation: use
package to prevent backend-specific logic from included in client bundle.server-only - Component Purity: Escape all user-provided content rendered in components. Never use
without sanitizer likedangerouslySetInnerHTML
.DOMPurify
Anti-Patterns
- No leaking DB fields to client: Use DTOs; never pass raw model objects.
- No
in client bundles: Mark asprocess.env
only if safe to expose.NEXT_PUBLIC_ - No unvalidated Server Action inputs: Always validate with Zod schema.
- No auth checks in shared Layouts: Auth in layouts insecure; use Middleware.