TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Is it the norm for companies/startups to not give a damn about security?

36 pointsby nonasktellover 2 years ago
Hi, I&#x27;ve joined a startup a few months ago(with a few dozens employees). A B2B startup which have some very huge clients which you all heard of, multinationals, some parts of governments.<p>It&#x27;s not critical infrastructure or anything close to that, but we deal with the personal data of pretty important employees of those companies, and have an app installed on their phones.<p>And the &quot;security&quot; culture, seems like the worst you could imagine, I wonder if it&#x27;s (almost) the norm in the industry or just some bad luck, would love to have your opinions and stories about this topic<p>A few months ago, I found a vulnerability allowing any user(and I do mean ANY user), to login as an admin on our homemade administration space with a simple trick, which would allow them to change almost any &quot;trusted&quot; content that users can see on our app, text, images, videos, links or files that they&#x27;ll be asked to open&#x2F;download, delete users, dump a list of all users...<p>Fixing this has been at the bottom of the todo list for months, and no one seems to care, no one is assigned to it. When it&#x27;s brought up people are like &quot;ooh yeah that&#x27;s like really really bad, but what about [tiny useless feature than one user asked about]?we don&#x27;t have the time to fix that!&quot;<p>Hundreds of employees passwords for what&#x27;s AFAIK our largest client, are stored in PLAINTEXT.(same story as the vulnerability, bottom of the todo list, no one cares)<p>Oh, and did I mention that any logged in user can call almost any API endpoints with almost zero verification that he&#x27;s allowed to call them?<p>Those 3 issues are still there after months even though everybody is aware of them.<p>Would you just get the hell out without looking back? or keep trying to improve stuff even when it takes months to just get them to care enough to start maybe thinking about assigning a dev to a problem?<p>How is it at your current&#x2F;past companies?<p>Thanks

22 comments

metadatover 2 years ago
No, this isn&#x27;t normal in my considerable experience. What you are experiencing signals that something is fundamentally lacking in the thinking and prioritization of the leadership.<p>The unfortunate reality is the class of companies called &quot;startups&quot; only requirement is that someone convinced someone else to give them money, and now they&#x27;re the boss. This can lead to all sorts of things.. like what you&#x27;re seeing.<p>I&#x27;d bail to somewhere else with more professional leadership. Even if this one instance gets fixed, the deficit is indicative of a cultural problem that I&#x27;ve not yet seen ever really change.<p>Not taking the security of your customers seriously is guaranteed poison in the medium to long term.
aintmeitover 2 years ago
Unless your company is doing things on the level of trafficking minors or racketeering, then the information that comes out will be run-of-the-mill oopsies. Having worked a bit in DevSecOps, I can tell you that storing clear-text passwords in places like version control files is much more common in companies than anyone would hope. Also, auth is just hard, in part because it forces servers to be stateful.<p>Because companies have a wide range of options for dealing with the consequences of leaks, they&#x27;ll prioritize security last instead of shifting left. Some common responses by companies include:<p>- denying there&#x27;s a problem<p>- covering up the problem<p>- acknowledging the problem in a blog and demand to be praised for the disclosure<p>- blaming employees for the mistake<p>To make a good plan, you can break down concerns piecemeal. What&#x27;s the worst case scenario if attackers get a hold of employee passwords? What happens when users trust tampered content?
评论 #32592845 未加载
raffraffraffover 2 years ago
In my experience, start-ups play fast and loose with all sorts of things like security, data integrity etc. It&#x27;s how they can quickly build a service an offer it to larger companies who would never get it done due to internal management inertia, politics, architecture reviews, project management, processes, audits, controls and regulations. However, it shouldn&#x27;t be &quot;that&quot; bad. For example, I worked at a start-up that successfully made it to $8+b valuation, and they had tons of extremely scary shit. But generally when someone found a critical issue, everybody sighed, rolled up their sleeves and fixed it. Because a security breach, data leakage or data loss that is caused by such negligence is a company extinction event for a start-up. These guys are playing Russian Roulette. Get out before the inevitable occurs.
giantg2over 2 years ago
&quot;Is it the norm for companies&#x2F;startups to not give a damn about security?&quot;<p>More or less, yes. They generally talk about security, but it&#x27;s mostly just lip service. Although I will say your examples are pretty extreme.<p>I once worked on a team as the security champion for a major financial system the company uses internally (thankfully) for trading. There was a problem with SQL injection on every page&#x2F;input we built in that system. And it had schema owner privileges, so you could drop tables and stuff. This is a possibility to happen by accident since there are trade desk devs who could have a tablename collision and accidentslly paste SQL into a field, let alone the malicious possibilities<p>I brought this up with the principle to see which of the two remediation plans he wanted to pursue and what resources he would provide me with for the work. Apparently they wanted to go with their own option of do nothing. They said there&#x27;s an automatic backup of the database in near realtime (forget the name). Would it duplicate dropping tables? How far back can you restore? Has it ever been tested? What are the procedures for restoring? How long to restore (even a 15 minute outage is the end of the world according to the business)? They didn&#x27;t know any of it, and they didn&#x27;t really care to.<p>I promptly left that team. They just wanted a security champion to do paperwork for regulatory compliance. I had no real power to make improvements beyond the smaller stuff could do myself.
zivkovicpover 2 years ago
Your examples seem pretty extreme, and I would say they are definitely not normal. I&#x27;d guess the leadership and engineering quality at this company is sub-par and they probably don&#x27;t even realize the extent of the problem.<p>With that said, my experience is that security issues get taken care of when they are very dangerous, or only after the main product tasks get done. Fixing minor issues in a (NEW) product&#x2F;company that might not survive the year is a comparative waste of time... survival comes first usually.
speedgooseover 2 years ago
It sounds like you care, not no one, so you could assign yourself to these issues and fix them. It’s easier to ask for forgiveness than permission.<p>If you can’t do that, or people get upsets because you did, you should probably start looking for a better job.
herbstover 2 years ago
I worked in a etablished PHP shop that only worked with middle sized to big companies. There was no security other than the default options shipped with the used products.<p>I guess it&#x27;s less about startup culture but more about bad culture in general.
powerhourover 2 years ago
I haven&#x27;t experienced anything this bad. I&#x27;ve seen security lapses and have been able to fix them on my own or with a team, and I don&#x27;t remember ever getting pushback.<p>It&#x27;s probably time to start interviewing. Ideally before your employer&#x27;s security woes become headline news. (Of course, if you&#x27;ve only been there a few months you can easily leave them off your resume once word of the flaws gets out.)
oreallyover 2 years ago
Without laws, companies are more concerned about their bottom line before user security. And you can&#x27;t blame them for that - people would rather put food on their table after all, vs something that&#x27;s going to slow you down or at most cause something that causes less damage then you think.
muzaniover 2 years ago
This seems to happen more in B2B startups in my experience. I think it&#x27;s because there&#x27;s just more blind trust in B2B, and the success bar is a little lower than B2C. I worked at a company which was testing on production, didn&#x27;t use source control. They messed up hard and frequent with critical customers, including a major media company that could have slandered the hell out of them.<p>That company still didn&#x27;t die and are popular in the community. Natural selection applies in the business world, but some startups really are the cockroaches of the world.<p>That said, it&#x27;s not <i>common</i>. It happens in maybe 2-3 jobs out of 10. Often these are the guys who say yes to everything the customer asks for, which puts them in a peculiar niche.
lasereyes136over 2 years ago
Many will justify it as we will be lucky to survive and grow to a point where a security incident will be a problem.<p>AppSec is never the most important thing on any product manager or product owners list. No one says AppSec isn&#x27;t important, just other things are more important. Sometimes the best you can do is talk them into letting the people that care dedicate some of their time to fixing security issues. While it seems bad, if this is a product or company you care about, working to make it better makes sense. You also might consider adding security concerns into requirements, acceptance criteria, and code reviews (if you have those) to stop it from getting worse.
superchromaover 2 years ago
Yes and no. They&#x27;ll throw a big wad of cash at some provider to get some badly hacked together SSO auth and endpoint monitoring solution but then release insecure garbage running on an ancient copy of android, debian or whatever.
msarrelover 2 years ago
Yes. Startups are deeply focused on revenue. Developing security for a product is considered &quot;extra&quot; and &quot;nice to have&quot;, not essential. That goes double for operations. I have never seen a startup actually practice security unless in preparation for an audit.
sergiotapiaover 2 years ago
No, in 15 years working I haven&#x27;t seen anything of that magnitude be ignored. You seem to have found a really bad organization. Something that large always was a drop everything and assign one person to fix it immediately kind of thing.
gitgudover 2 years ago
Some things at certain scales are just not the main priority.<p>This means security might not be valued, but that is a risk the business is taking in order to more resources towards the multitude of problems start-ups face...
zach_garwoodover 2 years ago
I wouldn&#x27;t say it&#x27;s abnormal -- startups are in a constant state of SNAFU (situation normal: all fucked up) -- but it&#x27;s definitely not acceptable.
aprdmover 2 years ago
I would say that it isn&#x27;t normal and it seems pretty bad.
danielmarkbruceover 2 years ago
Out of interest, why haven&#x27;t <i>you</i> fixed it?
评论 #32590197 未加载
评论 #32589440 未加载
评论 #32590522 未加载
mountainriverover 2 years ago
Yup “security third” is a very real idea, most startups don’t have time to worry about security much, they have to get a product launched
dev_0over 2 years ago
Yes even big companies don&#x27;t care about security.... it&#x27;s all facade and compliance
评论 #32589925 未加载
GentWhoCodesover 2 years ago
Obligatory GDPR<p>Poorly securing personal data in the UK&#x2F;EU is rather illegal. So no, any reputable shop *will* care about security, ensuring personal data is kept secure and bugs patched as a priority.<p>Going up the food chain, <i>&quot;huge clients which you all heard of, multinationals, some parts of governments&quot;</i> will not be impressed if you are found to be slack when it comes to leaking customers data.
cpachover 2 years ago
This sounds very bad and not normal. I would resign ASAP.