Главная
Study mode:
on
1
Intro
2
Good intentions
3
How do you build secure software
4
React example
5
Practical examples
6
HTML rendering
7
React dangerously set inner HTML
8
The solution
9
First takeaway
10
Documentation
11
Its not enough
12
Code Scan
13
Save HTML
14
Simplify your code
15
Zero findings
16
Encapsulation
17
Chasing Web Tokens
18
What is a JSON Web Token
19
Apache Pulsar vulnerability
20
Jot vulnerability
21
Dark mode
22
Open Source Documentation
23
Elginon Problem
24
Attack
25
Common Pitfalls
26
Json Web Tokens
27
Digital Signatures
28
Parse Claims
29
Key Rotation
30
What I need to learn
31
Why encapsulate
32
Flexibility
33
Netflix
34
Takeaways
35
Security Awareness
36
Encapsulate
37
Leverage tooling
38
Shameless plug
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the challenges and misconceptions of application security in this 43-minute Devoxx conference talk. Delve into practical examples that demonstrate how frameworks and libraries can inadvertently compromise security, leading to recurring vulnerabilities. Learn about more robust approaches to AppSec, including strategies for improving security at scale. Examine specific cases involving React, HTML rendering, and JSON Web Tokens, and understand common pitfalls in implementing security features. Gain valuable insights on encapsulation, leveraging tools, and fostering security awareness to create more secure and manageable applications.

AppSec is Too Hard

Devoxx
Add to list
00:00
-00:51