TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Five Minute Guide to Software Security

142 pointsby jtaftover 7 years ago

10 comments

Cyberdelicover 7 years ago
Not trusting user input is a good start, but the client shouldn&#x27;t be trusted, either.<p>I have seen plenty of web apps that fell short on this...<p>Whenever I&#x27;m on a web app that has a button shown but disabled, you can be pretty sure that I will enable that button and click it...<p>If the client is limiting the maximum length of the contents of a textbox, I&#x27;m probably going to change that and see if the server is performing the same validation...<p>My favorite so far, though, was client-side calculation and validation of order amounts for some products. Intercepting the JavaScript file and tweaking it before the browser started using it allowed me to place an older for a bunch of products for only $0.01 (going negative was also attempted, too, but this particular system did a pre-approval with a payment gateway and it didn&#x27;t like that... so I settled on a penny).<p>These were all things I&#x27;ve done with permission, of course... but it&#x27;s amazing what you can do when people assume the browser will always follow the rules...
评论 #15469370 未加载
评论 #15469379 未加载
评论 #15469423 未加载
matt_wulfeckover 7 years ago
These types of guides always overlook the most important principle of software security:<p>Always avoid reading, storing, or interacting with secure, personal, or otherwise &quot;interesting&quot; data. As much as possible, strip this information from your application, so that <i>when</i> it gets pwned the blast radius is absolutely miniscule.<p>Create software not liabilities.
评论 #15469153 未加载
评论 #15469166 未加载
评论 #15469354 未加载
X86BSDover 7 years ago
Wow did I miss arguably the most important box to check, KISS?<p>Seriously, keep it EFFING SIMPLE. The more complex and involved it is the more things can and will break.<p>Does no one follow that anymore?
评论 #15469175 未加载
评论 #15469127 未加载
stevoskiover 7 years ago
Can anyone explain what this means (or point me to somewhere where I can learn?)<p>&gt; If a stateless architecture being used, use a MAC or an authenticated encryption mode to authenticate input.<p>I ask as a developer of a SaaS product. I understood most of the tips but not this one.
评论 #15469535 未加载
评论 #15469533 未加载
petraover 7 years ago
This security list is only a partial list, and it&#x27;s not realistic for a busy programmer to cover everything well.<p>On the other hand, visual tools(low-code&#x2F;no-code), sold in cloud based models(and probably grabbing a lot of money), are backed by teams of experts who do security well and don&#x27;t expect the user to do any of it.<p>And as for tools take 100% of the security burden from the hands of the programmer - i haven&#x27;t seen any.<p>So my conclusion is: where security will matter - visual tools will dominate.
qaqover 7 years ago
&quot;Be prepared to investigate breaches.&quot; &lt;&lt; This
salqadriover 7 years ago
Great guide. Reminded me of some of the learnings from the Pokémon Go hacking expeditions I wrote about last year (<a href="https:&#x2F;&#x2F;medium.com&#x2F;@salqadri&#x2F;a-peek-into-the-pokémon-go-hacking-scene-68d219134b14" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;@salqadri&#x2F;a-peek-into-the-pokémon-go-hack...</a>).
nwrkover 7 years ago
&gt; Don&#x27;t assume something is secure without testing it.<p>Just don&#x27;t assume, please. Golden rule.
评论 #15471248 未加载
wnevetsover 7 years ago
&gt;Ensure use of Anti-CSRF tokens, CORS, and crossdomain.xml policies to prevent an attacker from forcing a user to submit authenticated requests.<p>isn&#x27;t crossdomain.xml an adobe flash thing?
评论 #15469304 未加载
pjmlpover 7 years ago
- Use languages whose designers care about secure code