DEV Community

Discussion on: Security tips for Djangonauts

Collapse
 
sobolevn profile image
Nikita Sobolev • Edited

I would really recommend to try wemake-django-template for your next project. It is a boilerplate focused on code quality and security.

There are several features I would love to highlight:

  • Dependencies are checked on every CI run with safety
  • Insecure dependencies are automatically updated with snyk and dependendabot
  • Bruteforce protection by django-axes
  • Smart and safe http headers with django-csp, django-http-referrer-policy, and django-feature-policy
  • Safe password hashers: bcrypt and argon
  • Static analysis with wemake-python-styleguide and bandit
  • Respecting builtin django's security checks in CI
  • Enforced HTTPs by default
  • And many others! Including documentation with best practices and common problems

GitHub logo wemake-services / wemake-django-template

Bleeding edge django template focused on code quality and security.

wemake-django-template

wemake.services Awesome Build status Documentation Status Dependencies Status wemake-python-styleguide

Bleeding edge django2.2 template focused on code quality and security.


Purpose

This project is used to scaffold a django project structure Just like django-admin.py startproject but better.

Features

Installation

Firstly, you will need to install dependencies:

pip install cookiecutter jinja2-git

Then, create a project itself:

cookiecutter gh:wemake-services/wemake-django-template

Who are using this template?

If you use our template, please add yourself or your company in the list.

We offer free email support for anyone who is using this If you have any problems or questions,…

Check it out!