Главная
Study mode:
on
1
Intro
2
Bandit
3
Command Injection
4
User Input
5
Temp Paths
6
TLS
7
Weak cryptography
8
promiscuous file permissions
9
hardcoded credentials
10
tempfile
11
run bandit against ansible
12
ansible prompt
13
raw input
14
essential workflow
15
removing a bug
16
build a gate
17
Next steps
18
Metrics
19
Secure Development Guidance
20
Bandit Documentation
21
Questions
Description:
Explore the world of Python code security in this 26-minute conference talk from BSidesSF 2017. Dive into Bandit, an open-source tool for discovering common security flaws in Python code. Learn how Bandit works, its origins in OpenStack, and its widespread adoption beyond. Discover how to customize Bandit for different workflows, create a Security CI pipeline, and extend its capabilities. Follow along as Travis McPeak, a core Bandit developer, guides you through detecting critical security issues like command injection, SQL injection, insecure temporary file usage, and more. Gain insights into essential workflows, bug removal, and building security gates. Explore topics such as user input handling, TLS implementation, weak cryptography, file permissions, and hardcoded credentials. Conclude with next steps, metrics, secure development guidance, and Bandit documentation to enhance your Python code security practices.

When Bandit Strikes - Defend Your Python Code

Security BSides San Francisco
Add to list
0:00 / 0:00