DEV Community

# codesecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Lottie Player npm package compromised for crypto wallet theft

Lottie Player npm package compromised for crypto wallet theft

Comments
4 min read
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Comments
6 min read
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code

Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code

Comments
4 min read
Automatically fix code vulnerabilities with AI

Automatically fix code vulnerabilities with AI

3
Comments
5 min read
How to prevent log injection vulnerability in JavaScript and Node.js applications

How to prevent log injection vulnerability in JavaScript and Node.js applications

2
Comments
6 min read
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code

Identifying Insecure C Code with Valgrind and Fixing with Snyk Code

2
Comments
6 min read
What you should know about PHP code security

What you should know about PHP code security

2
Comments
7 min read
How to mitigate security issues in GenAI code and LLM integrations

How to mitigate security issues in GenAI code and LLM integrations

2
Comments
9 min read
Vulnerabilities in NodeJS C/C++ add-on extensions

Vulnerabilities in NodeJS C/C++ add-on extensions

1
Comments
12 min read
Four easy ways to analyze your Java and Kotlin code

Four easy ways to analyze your Java and Kotlin code

2
Comments
8 min read
Preventing SQL injection in C# with Entity Framework

Preventing SQL injection in C# with Entity Framework

11
Comments
5 min read
How to secure a REST API?

How to secure a REST API?

2
Comments
11 min read
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk

Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk

4
Comments
5 min read
Breaking caches and bypassing Istio RBAC with HTTP response header injection

Breaking caches and bypassing Istio RBAC with HTTP response header injection

2
Comments
11 min read
Essential Node.js backend examples for developers in 2024

Essential Node.js backend examples for developers in 2024

6
Comments 2
10 min read
Preventing broken access control in express Node.js applications

Preventing broken access control in express Node.js applications

5
Comments
12 min read
Symmetric vs. asymmetric encryption: Practical Python examples

Symmetric vs. asymmetric encryption: Practical Python examples

3
Comments
16 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

2
Comments
4 min read
An investigation into code injection vulnerabilities caused by generative AI

An investigation into code injection vulnerabilities caused by generative AI

3
Comments
4 min read
Exploiting HTTP/2 CONTINUATION frames for DoS attacks

Exploiting HTTP/2 CONTINUATION frames for DoS attacks

2
Comments
4 min read
Getting started with PHP static analysis in 2024

Getting started with PHP static analysis in 2024

1
Comments
10 min read
5 Node.js security code snippets every backend developer should know

5 Node.js security code snippets every backend developer should know

2
Comments
9 min read
Preventing SQL injection attacks in Node.js

Preventing SQL injection attacks in Node.js

10
Comments
9 min read
Preventing server-side request forgery in Node.js applications

Preventing server-side request forgery in Node.js applications

6
Comments
8 min read
10 GitHub Security Best Practices

10 GitHub Security Best Practices

3
Comments
14 min read
7 tips to become a successful bug bounty hunter

7 tips to become a successful bug bounty hunter

18
Comments 1
5 min read
How to Use CodeWhisperer to Identify Issues and Use Suggestions to Improve Code Security in your IDE

How to Use CodeWhisperer to Identify Issues and Use Suggestions to Improve Code Security in your IDE

Comments
10 min read
Enhancing code to cloud security with the Common Configuration Scoring System

Enhancing code to cloud security with the Common Configuration Scoring System

5
Comments
5 min read
Code injection in Python: examples and prevention

Code injection in Python: examples and prevention

6
Comments
8 min read
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools

Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools

2
Comments
6 min read
Getting started with query parameterization

Getting started with query parameterization

Comments
9 min read
What’s new in CVSS 4.0

What’s new in CVSS 4.0

Comments
8 min read
GitHub Copilot code security: XSS in React

GitHub Copilot code security: XSS in React

4
Comments 1
8 min read
Securing symmetric encryption algorithms in Java

Securing symmetric encryption algorithms in Java

4
Comments
7 min read
How to prevent NullPointerExceptions in Java

How to prevent NullPointerExceptions in Java

5
Comments 6
10 min read
Security implications of cross-origin resource sharing (CORS) in Node.js

Security implications of cross-origin resource sharing (CORS) in Node.js

2
Comments 1
11 min read
A guide to input validation with Spring Boot

A guide to input validation with Spring Boot

Comments
12 min read
How to implement SSL/TLS pinning in Node.js

How to implement SSL/TLS pinning in Node.js

4
Comments
9 min read
Top 5 VS Code extensions for security

Top 5 VS Code extensions for security

9
Comments 6
7 min read
Swift deserialization security primer

Swift deserialization security primer

2
Comments
4 min read
XS leaks: What they are and how to avoid them

XS leaks: What they are and how to avoid them

1
Comments
9 min read
Secure Java URL encoding and decoding

Secure Java URL encoding and decoding

7
Comments 1
14 min read
Mitigating DOM clobbering attacks in JavaScript

Mitigating DOM clobbering attacks in JavaScript

6
Comments
7 min read
The importance of verifying webhook signatures

The importance of verifying webhook signatures

Comments
8 min read
How secure is WebAssembly? 5 security concerns unique to WebAssembly

How secure is WebAssembly? 5 security concerns unique to WebAssembly

6
Comments
6 min read
Finding and fixing insecure direct object references in Python

Finding and fixing insecure direct object references in Python

1
Comments
6 min read
Session management security: Best practices for protecting user sessions

Session management security: Best practices for protecting user sessions

4
Comments
11 min read
Building a security-conscious CI/CD pipeline

Building a security-conscious CI/CD pipeline

2
Comments
7 min read
How to prevent XPath injection attacks

How to prevent XPath injection attacks

4
Comments
8 min read
How to perform JavaBeans Validation

How to perform JavaBeans Validation

4
Comments
7 min read
The SecurityManager is getting removed in Java: What that means for you

The SecurityManager is getting removed in Java: What that means for you

1
Comments
10 min read
loading...