react-code-dataset
/
next.js
/docs
/01-app
/03-api-reference
/05-config
/01-next-config-js
/taint.mdx
| --- | |
| title: taint | |
| description: Enable tainting Objects and Values. | |
| version: experimental | |
| --- | |
| ## Usage | |
| The `taint` option enables support for experimental React APIs for tainting objects and values. This feature helps prevent sensitive data from being accidentally passed to the client. When enabled, you can use: | |
| - [`experimental_taintObjectReference`](https://react.dev/reference/react/experimental_taintObjectReference) taint objects references. | |
| - [`experimental_taintUniqueValue`](https://react.dev/reference/react/experimental_taintUniqueValue) to taint unique values. | |
| > **Good to know**: Activating this flag also enables the React `experimental` channel for `app` directory. | |
| ```ts filename="next.config.ts" switcher | |
| import type { NextConfig } from 'next' | |
| const nextConfig: NextConfig = { | |
| experimental: { | |
| taint: true, | |
| }, | |
| } | |
| export default nextConfig | |
| ``` | |
| ```js filename="next.config.js" switcher | |
| /** @type {import('next').NextConfig} */ | |
| const nextConfig = { | |
| experimental: { | |
| taint: true, | |
| }, | |
| } | |
| module.exports = nextConfig | |
| ``` | |
| > **Warning:** Do not rely on the taint API as your only mechanism to prevent exposing sensitive data to the client. See our [security recommendations](/blog/security-nextjs-server-components-actions). | |
| The taint APIs allows you to be defensive, by declaratively and explicitly marking data that is not allowed to pass through the Server-Client boundary. When an object or value, is passed through the Server-Client boundary, React throws an error. | |
| This is helpful for cases where: | |
| - The methods to read data are out of your control | |
| - You have to work with sensitive data shapes not defined by you | |
| - Sensitive data is accessed during Server Component rendering | |
| It is recommended to model your data and APIs so that sensitive data is not returned to contexts where it is not needed. | |
| ## Caveats | |
| - Tainting can only keep track of objects by reference. Copying an object creates an untainted version, which loses all guarantees given by the API. You'll need to taint the copy. | |
| - Tainting cannot keep track of data derived from a tainted value. You also need to taint the derived value. | |
| - Values are tainted for as long as their lifetime reference is within scope. See the [`experimental_taintUniqueValue` parameters reference](https://react.dev/reference/react/experimental_taintUniqueValue#parameters), for more information. | |
| ## Examples | |
| ### Tainting an object reference | |
| In this case, the `getUserDetails` function returns data about a given user. We taint the user object reference, so that it cannot cross a Server-Client boundary. For example, assuming `UserCard` is a Client Component. | |
| ```ts switcher | |
| import { experimental_taintObjectReference } from 'react' | |
| function getUserDetails(id: string): UserDetails { | |
| const user = await db.queryUserById(id) | |
| experimental_taintObjectReference( | |
| 'Do not use the entire user info object. Instead, select only the fields you need.', | |
| user | |
| ) | |
| return user | |
| } | |
| ``` | |
| ```js switcher | |
| import { experimental_taintObjectReference } from 'react' | |
| function getUserDetails(id) { | |
| const user = await db.queryUserById(id) | |
| experimental_taintObjectReference( | |
| 'Do not use the entire user info object. Instead, select only the fields you need.', | |
| user | |
| ) | |
| return user | |
| } | |
| ``` | |
| We can still access individual fields from the tainted `userDetails` object. | |
| ```tsx filename="app/contact/page.tsx switcher | |
| export async function ContactPage({ | |
| params, | |
| }: { | |
| params: Promise<{ id: string }> | |
| }) { | |
| const { id } = await params | |
| const userDetails = await getUserDetails(id) | |
| return ( | |
| <UserCard | |
| firstName={userDetails.firstName} | |
| lastName={userDetails.lastName} | |
| /> | |
| ) | |
| } | |
| ``` | |
| ```jsx filename="app/contact/page.js switcher | |
| export async function ContactPage({ params }) { | |
| const { id } = await params | |
| const userDetails = await getUserDetails(id) | |
| return ( | |
| <UserCard | |
| firstName={userDetails.firstName} | |
| lastName={userDetails.lastName} | |
| /> | |
| ) | |
| } | |
| ``` | |
| Now, passing the entire object to the Client Component will throw an error. | |
| ```tsx switcher | |
| export async function ContactPage({ | |
| params, | |
| }: { | |
| params: Promise<{ id: string }> | |
| }) { | |
| const userDetails = await getUserDetails(id) | |
| // Throws an error | |
| return <UserCard user={userDetails} /> | |
| } | |
| ``` | |
| ```jsx switcher | |
| export async function ContactPage({ params }) { | |
| const { id } = await params | |
| const userDetails = await getUserDetails(id) | |
| // Throws an error | |
| return <UserCard user={userDetails} /> | |
| } | |
| ``` | |
| ### Tainting a unique value | |
| In this case, we can access the server configuration by awaiting calls to `config.getConfigDetails`. However, the system configuration contains the `SERVICE_API_KEY` that we don't want to expose to clients. | |
| We can taint the `config.SERVICE_API_KEY` value. | |
| ```ts switcher | |
| import { experimental_taintUniqueValue } from 'react' | |
| function getSystemConfig(): SystemConfig { | |
| const config = await config.getConfigDetails() | |
| experimental_taintUniqueValue( | |
| 'Do not pass configuration tokens to the client', | |
| config, | |
| config.SERVICE_API_KEY | |
| ) | |
| return config | |
| } | |
| ``` | |
| ```js switcher | |
| import { experimental_taintUniqueValue } from 'react' | |
| function getSystemConfig() { | |
| const config = await config.getConfigDetails() | |
| experimental_taintUniqueValue( | |
| 'Do not pass configuration tokens to the client', | |
| config, | |
| config.SERVICE_API_KEY | |
| ) | |
| return config | |
| } | |
| ``` | |
| We can still access other properties of the `systemConfig` object. | |
| ```tsx | |
| export async function Dashboard() { | |
| const systemConfig = await getSystemConfig() | |
| return <ClientDashboard version={systemConfig.SERVICE_API_VERSION} /> | |
| } | |
| ``` | |
| However, passing `SERVICE_API_KEY` to `ClientDashboard` throws an error. | |
| ```tsx | |
| export async function Dashboard() { | |
| const systemConfig = await getSystemConfig() | |
| // Someone makes a mistake in a PR | |
| const version = systemConfig.SERVICE_API_KEY | |
| return <ClientDashboard version={version} /> | |
| } | |
| ``` | |
| Note that, even though, `systemConfig.SERVICE_API_KEY` is reassigned to a new variable. Passing it to a Client Component still throws an error. | |
| Whereas, a value derived from a tainted unique value, will be exposed to the client. | |
| ```tsx | |
| export async function Dashboard() { | |
| const systemConfig = await getSystemConfig() | |
| // Someone makes a mistake in a PR | |
| const version = `version::${systemConfig.SERVICE_API_KEY}` | |
| return <ClientDashboard version={version} /> | |
| } | |
| ``` | |
| A better approach is to remove `SERVICE_API_KEY` from the data returned by `getSystemConfig`. | |