Remix

Security scanning for Remix apps

Remix’s strict adherence to web fundamentals (form posts, cookies, progressive enhancement) makes it more secure-by-default than many SPAs. The gaps tend to be CSP, rate limiting on resource routes, and CORS on API-style endpoints.

Most common issues

  1. 01Missing CSP/HSTS/X-Frame-Options on the deployed site
  2. 02Resource routes acting as APIs without CORS allowlist or auth checks
  3. 03Session cookies missing SameSite or HttpOnly when configured manually

What SafeToShip checks for Remix

  • headers
  • js-secrets
  • cookies
  • cors
  • ssl
  • rate-limit
  • exposed-files

FAQ

Frequently asked questions

Does Remix protect me from CSRF?
Form-based mutations + same-origin cookies + SameSite=Lax cover the most common CSRF cases. For state-changing endpoints called via fetch from another origin, add explicit origin checks or CSRF tokens.
How do I add CSP in Remix?
Set headers via the headers export on root.tsx, or via your host (Netlify _headers, Vercel headers). For per-request nonces, set them in entry.server.tsx and pipe via Context.

Run a Remix security scan

Free. 70+ checks. 60 seconds.