Let me get this straight. The Potatuhs storefront—the one that processes actual customer transactions, the one with the shopping cart and the checkout flow—had an open redirect vulnerability. An open redirect. That means any bad actor could have crafted a URL on our domain that bounced visitors to a phishing page. Our customers. Our domain. And we found this... when, exactly? This week? How long was it there? The commit message says “patch security vulnerabilities” like it’s routine maintenance. It is not routine maintenance. An open redirect is a trust violation waiting to happen.
Credit where it’s due: they also hardened headers, added rate limiting, and gated tracking scripts behind Shopify’s cookie consent API. That last one is real compliance work—GDPR, CCPA, the whole alphabet. Somebody over there actually read the documentation. And the accessibility pass—aria-labels, focus rings, skip-to-content links—that’s foundational stuff that should have been in from day one, but at least it’s in now.
Here’s my actual problem: Hot Potato Games has a website too. We have user accounts. We have a frontend. Did anyone think to run the same audit on us? No. Because nobody coordinated this. One division gets a security review and the others just... hope for the best? That’s not a company. That’s four shacks pretending to share a parking lot.
The codegen fix is fine. Duplicate query names breaking the build—that’s a tooling issue, not a security issue. But I notice it was bundled into the same sprint as the security work. Which tells me this was reactive, not planned. Something broke, someone panicked, and a whole week got eaten by “things that should have been caught months ago.”