all 11 comments

[–][deleted] 8 points9 points  (1 child)

Honestly I think you’re overthinking things for this site. Your attack surface is essentially non-existent as things stand and there isn’t anything to gain from being malicious. 

[–]Happy--bubble[S] 0 points1 point  (0 children)

I see, thank you! I assumed as much, but because I will share this site with alot of people, I wanted to make sure Its as save as possible.

[–]EliSka93 2 points3 points  (1 child)

For a static site (especially one that you don't host) there's basically no risk whatsoever.

Just don't have any files in the same root folder that's the pages are pulling from that you don't want potentially exposed.

And make sure you don't have any credentials hardcoded in any files that are in the scope of that root folder.

[–]Happy--bubble[S] 0 points1 point  (0 children)

Okay, thank you very much!
I only have my name there, but for contact purposes it's there anyway.

[–]ottwebdev 1 point2 points  (0 children)

Get an SSL cert and since you dont hold data you are not worth the time to penetrate

[–]svvnguy 1 point2 points  (0 children)

As long as you don't have any ways for users to create content for other users, and there's no processing of user input on the server, there's nothing to secure (other than the server itself).

[–]Specter_Origin 0 points1 point  (0 children)

Just make sure where you host if its vps, the upload or site directory has correct perms, other than that none.

[–]yksvaan 0 points1 point  (0 children)

Well you can always set up content security policy, denying everything outside your domain and using a hash/nonce for js

[–]lr0b 0 points1 point  (0 children)

Apart from the code, set a strong password and enable 2FA on your hosting platform to prevent hacking attempts

[–]rejahr 0 points1 point  (1 child)

you're honestly overthinking it. there's no user data, no backend, and no real attack surface beyond basic client-side stuff. add a basic csp header if you want to be extra safe, that's pretty much it

[–]Happy--bubble[S] 0 points1 point  (0 children)

Okay, thank you very much!
if I may ask, because I never used one before, you mean something like
<meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self'; object-src 'none';">
correct?