Always provide explicit and accurate documentation for security-related configurations, including: 1. Use proper configuration property syntax with validation where possible (e.g., `configprop:spring.security.oauth2.resourceserver.jwt.audiences[]`)
Always provide explicit and accurate documentation for security-related configurations, including:
Use proper configuration property syntax with validation where possible (e.g., configprop:spring.security.oauth2.resourceserver.jwt.audiences[]
)
Clearly document default security behaviors, especially which endpoints or features are exposed/protected by default
Include explicit warnings when documenting configurations that relax security for development tools
When showing how to disable security features, clearly state the security implications
Example for development tool security configuration:
// SECURITY WARNING: This configuration exposes the H2 console to anyone
// and disables CSRF protection. Only use in development environments.
@Bean
public WebSecurityCustomizer h2ConsoleSecurityCustomizer() {
return (web) -> web.ignoring().requestMatchers(PathRequest.toH2Console());
}
In documentation, prefer phrasing like “only the /health
endpoint is exposed over HTTP by default” rather than vague terms like “secret” to clearly communicate security boundaries.
Enter the URL of a public GitHub repository