Skip to content

Security Model

Overview

@appzgatenz/label-print-topbridge-js employs multiple layers of security defenses to prevent unauthorized calls and data leakage.

1. Fixed Local Connection

The SDK communicates exclusively with the locally running Tray App. There is no configuration option for the connection address, which fundamentally prevents redirecting the SDK to a remote server.

2. Source Verification

SDK requests carry a caller-origin identifier that is validated server-side. Requests from unauthorized sources are rejected by the Tray App.

3. URL Safety Validation

Before presenting external links from Tray App error responses, the SDK validates protocols:

typescript
// Only the following protocols are allowed
'https://'
'ms-windows-store://'
'http://'
'javascript:'
'data:'

4. Input Sanitization

The SDK automatically strips formula injection prefixes (such as = and =@) from print data to prevent injection attacks.

Known Limitations

LimitationDescriptionMitigation
Browser cannot prevent page spoofingMalicious pages can implement the WS protocol themselvesTray App source verification + server-side validation
WS protocol is unencryptedlocalhost communication is not encrypted by defaultLocal communication does not require encryption (no network transmission risk)