<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Беле Нуар Флеминг</title>
    <description>The latest articles on Forem by Беле Нуар Флеминг (@ind4skylivey).</description>
    <link>https://forem.com/ind4skylivey</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3644146%2Ffbc6947b-8813-4133-8293-d30a427adc2e.jpg</url>
      <title>Forem: Беле Нуар Флеминг</title>
      <link>https://forem.com/ind4skylivey</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ind4skylivey"/>
    <language>en</language>
    <item>
      <title>🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves</title>
      <dc:creator>Беле Нуар Флеминг</dc:creator>
      <pubDate>Wed, 03 Dec 2025 19:30:36 +0000</pubDate>
      <link>https://forem.com/ind4skylivey/laravel-secure-baseline-the-guardian-your-pipeline-deserves-3j1h</link>
      <guid>https://forem.com/ind4skylivey/laravel-secure-baseline-the-guardian-your-pipeline-deserves-3j1h</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jmfl1cip0ngi9exjlg4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jmfl1cip0ngi9exjlg4.png" alt="Dark cyber-pastel purple hero banner showing a Linux terminal with Laravel Secure Baseline scanning commands, a centered security shield icon, and soft falling CLI code fragments representing pipeline hardening before deployment" width="800" height="443"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Deploying Laravel apps without automated security checks is like launching a starship hoping the oxygen system is probably fine. Teams that build in CI need something better than vibes and optimistic shrugging.&lt;/p&gt;

&lt;p&gt;Laravel Secure Baseline is a CI-friendly pre-deploy scanner that detects common Laravel security misconfigurations before they ship to production. No telemetry. No remote pings. No side quests to mystery servers. It runs entirely inside your pipeline.&lt;/p&gt;

&lt;p&gt;Harden · Baseline · Deploy&lt;br&gt;
🚀 Harden · Baseline · Deploy&lt;br&gt;
🧪 Zero noise. Zero telemetry. Pure pipeline armor.&lt;/p&gt;

&lt;p&gt;That’s the mantra. Repeated thrice if you whisper it dramatically enough into your CI config, nothing bad happens.&lt;/p&gt;

&lt;p&gt;What it inspects in your Laravel project&lt;/p&gt;

&lt;p&gt;Environment safety: APP_DEBUG, APP_KEY, APP_URL, APP_ENV&lt;/p&gt;

&lt;p&gt;Secure cookies and headers: HSTS, CSP, X-Frame-Options, SameSite, Secure, HttpOnly&lt;/p&gt;

&lt;p&gt;Risky configurations: CORS wildcards, weak logging levels, exposed storage&lt;/p&gt;

&lt;p&gt;Debug leaks: Telescope, Horizon, phpinfo() and debug routes living where they shouldn’t&lt;/p&gt;

&lt;p&gt;Dependency hygiene: outdated or insecure composer packages&lt;/p&gt;

&lt;p&gt;Metadata security: APP_URL mismatches, permissive session drivers, verbose errors&lt;/p&gt;

&lt;p&gt;Optional fail-on detection to actively block deploys when unsafe values are found in CI&lt;/p&gt;

&lt;p&gt;When this runs in CI and finds a critical issue, it doesn’t whisper. It does this:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;🚨 CI BLOCKED — APP_DEBUG=true detected in production environment.&lt;br&gt;
Fix it, you beautiful code sorcerer 🛡️&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Production pipelines aren’t for guessing games, so it literally exits with a failure code when you tell it to.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quick Install&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;composer require ind4skylivey/laravel-secure-baseline --dev&lt;br&gt;
php artisan key:generate --quiet&lt;br&gt;
php artisan secure:scan&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Minimal GitHub Actions step&lt;/p&gt;

&lt;p&gt;&lt;code&gt;- run: php artisan secure:scan --fail-on=fail --error-exit-code=1&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Add that into your GitHub Actions CI job, and suddenly your workflow gains posture and a glowing shield.&lt;/p&gt;

&lt;p&gt;Output formats it generates&lt;/p&gt;

&lt;p&gt;It speaks multiple dialects so your tooling ecosystem can consume it:&lt;/p&gt;

&lt;p&gt;CLI text report&lt;/p&gt;

&lt;p&gt;HTML dashboard&lt;/p&gt;

&lt;p&gt;JSON structured output&lt;/p&gt;

&lt;p&gt;Markdown report&lt;/p&gt;

&lt;p&gt;SARIF (for GitHub security alerts)&lt;/p&gt;

&lt;p&gt;GitHub annotations when failing CI&lt;/p&gt;

&lt;p&gt;SARIF + MD combo for that “pro security lore” feeling&lt;/p&gt;

&lt;p&gt;Min-Action pipeline mode (--fail-on=fail) to block deploys&lt;/p&gt;

&lt;p&gt;Why teams adopt it&lt;/p&gt;

&lt;p&gt;CI is the only place where saying “no” to broken or unsafe code is considered polite.&lt;/p&gt;

&lt;p&gt;It blocks CI deploys when APP_DEBUG=true appears in unsafe environments&lt;/p&gt;

&lt;p&gt;It enforces secure cookies and headers by default&lt;/p&gt;

&lt;p&gt;It scans dependencies with no external calls&lt;/p&gt;

&lt;p&gt;It emits GitHub-friendly security formats like SARIF&lt;/p&gt;

&lt;p&gt;It’s fast, locally executed, and doesn’t collect any data beyond your terminal's attention span&lt;/p&gt;

&lt;p&gt;DEMO&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvoiua7k8f3z3jwvykxzr.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvoiua7k8f3z3jwvykxzr.gif" alt="CLI demo GIF looping the execution of php artisan secure:scan, displaying Laravel security checks running in terminal, generating a pass/fail report for CI deployment protection" width="1689" height="1008"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;✅ All clear. The deploy rune glows softly. You may pass.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Reads code, catches issues, produces reports — basically your CI wearing armor.&lt;/p&gt;

&lt;p&gt;Contribute to the fortress&lt;/p&gt;

&lt;p&gt;Have ideas for new checks? Bring them. Reasonable, bizarre, inspired — as long as they can be validated through CI and reality.&lt;/p&gt;

&lt;p&gt;Security suggestions go into SECURITY.md. Code improvements via pull request. Civilized conversation via issue ticket.&lt;/p&gt;

&lt;p&gt;CI pipelines were meant to be strict, predictable, and fast. Security checks should be too. With Laravel Secure Baseline, deploys stop breaking, apps stop leaking, and developers keep sleeping.&lt;/p&gt;

&lt;p&gt;The strangeness of the universe is constant, but your deploy pipeline doesn’t have to be.&lt;/p&gt;

</description>
      <category>laravel</category>
      <category>php</category>
      <category>security</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
