Главная
Study mode:
on
1
Introduction
2
Have a secure mindset
3
What is user input
4
Injections
5
Iterable IDs
6
University Unique Identifier
7
SQL Injection
8
Making Friends
9
Login Bypass
10
Valid Login
11
Unsafe File Upload
12
More Slides
13
Reflecting XSS
14
More vulnerabilities
15
Encoding vs Encryption
16
face bomb
17
encrypted gopher
18
encryption
19
TLS handshake
20
What can you do
21
Best Practices
22
hashing vs encryption
23
argon2id
24
OWASP
25
Supply chain
26
Famous attacks
27
Thirdparty libraries
28
Linus
29
Verified Unverified
30
Recap
31
Be Proactive
32
Conclusion
Description:
Learn secure coding practices in Go to avoid common vulnerabilities in this GopherCon 2022 conference talk. Explore the OWASP Top 10 application vulnerabilities and their relevance to Go development. Discover how to adopt a secure mindset, handle user input safely, and prevent various types of injections, including SQL injection and XSS. Understand the differences between encoding and encryption, learn about TLS handshakes, and explore best practices for hashing and encryption. Dive into supply chain security, famous attacks, and the importance of vetting third-party libraries. Gain practical insights to proactively enhance the security of your Go applications and protect against potential threats.

Secure Coding in Go - Avoiding Common Vulnerabilities

Gopher Academy
Add to list