TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why software 'security debt' is becoming a serious problem for developers

20 pointsby Beggers1960over 1 year ago

5 comments

jollofricepeasover 1 year ago
This is marketing for Veracode which is crap by the way.<p>You can’t assess for risk without knowing anything about the environment, compensating controls and business logic.<p>Veracode is a check-the-box enterprise compliance tool that reduces engineering productivity and corporate profitability.<p>Yes, vulnerability management is an important problem but Veracode is not the solution not even close.
评论 #39382997 未加载
评论 #39383073 未加载
评论 #39382898 未加载
评论 #39382775 未加载
PeterisPover 1 year ago
Automated detection of risky code can be very useful, but it inherently lacks the capacity to differentiate whether a particular case of bad practice actually is a flaw or not. For a simplified example, usage of eval() in many dynamic languages is potentially risky and <i>could</i> result in a total takeover of the application, so these tools will generally flag it as &#x27;critical&#x27; - even if in that particular case this &#x27;eval&#x27; is run on data that can&#x27;t possibly be affected by any user-controlled input (in that case it was used in a slightly weird design for code generation to save on copypasta) and does not have any security risk.<p>Anecdotally, when I have done triage on such analysis, perhaps 5-10% of things the tools marked as &#x27;critical&#x27; (i.e. <i>potentially</i> critical) were flaws which might have had some actual impact and need to be fixed. So when some vendor says in an article like this &quot;The study found nearly two-thirds (63%) of the applications scanned had flaws in the first-party code&quot;, keep that in mind - they&#x27;re generally treating all detections as real, but it&#x27;s rarely the case.<p>But on the other hand, it may well be the case that it&#x27;s simpler to have a process to just clean up all suspicious places in the code; just as the simplest way to avoid use-after-free errors is to use a garbage-collected language instead of just trying to ensure that every single memory allocation in C is correctly implemented.
评论 #39382974 未加载
评论 #39382948 未加载
mritsover 1 year ago
When I stared in professional software there was almost an extreme paranoia of adding new libraries. Now we have 20 year olds adding whatever they want via NPM.
评论 #39383831 未加载
评论 #39382989 未加载
throwawaaarrghover 1 year ago
Lol, I haven&#x27;t noticed software developers caring about security any more than they used to. 99% of them don&#x27;t care, and 1% of them are responsible for 75% of secure code. Moreover, there is no consequence if they write insecure code, just like there&#x27;s no consequence if they write unreliable code. They get the same paycheck regardless of the outcome.
ngneerover 1 year ago
Odds are against security. While it is natural to want to automate, programs have a hard time understanding and reasoning about other programs.