TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Is it the norm for companies/startups to not give a damn about security?

36 点作者 nonasktell超过 2 年前
Hi, I&#x27;ve joined a startup a few months ago(with a few dozens employees). A B2B startup which have some very huge clients which you all heard of, multinationals, some parts of governments.<p>It&#x27;s not critical infrastructure or anything close to that, but we deal with the personal data of pretty important employees of those companies, and have an app installed on their phones.<p>And the &quot;security&quot; culture, seems like the worst you could imagine, I wonder if it&#x27;s (almost) the norm in the industry or just some bad luck, would love to have your opinions and stories about this topic<p>A few months ago, I found a vulnerability allowing any user(and I do mean ANY user), to login as an admin on our homemade administration space with a simple trick, which would allow them to change almost any &quot;trusted&quot; content that users can see on our app, text, images, videos, links or files that they&#x27;ll be asked to open&#x2F;download, delete users, dump a list of all users...<p>Fixing this has been at the bottom of the todo list for months, and no one seems to care, no one is assigned to it. When it&#x27;s brought up people are like &quot;ooh yeah that&#x27;s like really really bad, but what about [tiny useless feature than one user asked about]?we don&#x27;t have the time to fix that!&quot;<p>Hundreds of employees passwords for what&#x27;s AFAIK our largest client, are stored in PLAINTEXT.(same story as the vulnerability, bottom of the todo list, no one cares)<p>Oh, and did I mention that any logged in user can call almost any API endpoints with almost zero verification that he&#x27;s allowed to call them?<p>Those 3 issues are still there after months even though everybody is aware of them.<p>Would you just get the hell out without looking back? or keep trying to improve stuff even when it takes months to just get them to care enough to start maybe thinking about assigning a dev to a problem?<p>How is it at your current&#x2F;past companies?<p>Thanks

22 条评论

metadat超过 2 年前
No, this isn&#x27;t normal in my considerable experience. What you are experiencing signals that something is fundamentally lacking in the thinking and prioritization of the leadership.<p>The unfortunate reality is the class of companies called &quot;startups&quot; only requirement is that someone convinced someone else to give them money, and now they&#x27;re the boss. This can lead to all sorts of things.. like what you&#x27;re seeing.<p>I&#x27;d bail to somewhere else with more professional leadership. Even if this one instance gets fixed, the deficit is indicative of a cultural problem that I&#x27;ve not yet seen ever really change.<p>Not taking the security of your customers seriously is guaranteed poison in the medium to long term.
aintmeit超过 2 年前
Unless your company is doing things on the level of trafficking minors or racketeering, then the information that comes out will be run-of-the-mill oopsies. Having worked a bit in DevSecOps, I can tell you that storing clear-text passwords in places like version control files is much more common in companies than anyone would hope. Also, auth is just hard, in part because it forces servers to be stateful.<p>Because companies have a wide range of options for dealing with the consequences of leaks, they&#x27;ll prioritize security last instead of shifting left. Some common responses by companies include:<p>- denying there&#x27;s a problem<p>- covering up the problem<p>- acknowledging the problem in a blog and demand to be praised for the disclosure<p>- blaming employees for the mistake<p>To make a good plan, you can break down concerns piecemeal. What&#x27;s the worst case scenario if attackers get a hold of employee passwords? What happens when users trust tampered content?
评论 #32592845 未加载
raffraffraff超过 2 年前
In my experience, start-ups play fast and loose with all sorts of things like security, data integrity etc. It&#x27;s how they can quickly build a service an offer it to larger companies who would never get it done due to internal management inertia, politics, architecture reviews, project management, processes, audits, controls and regulations. However, it shouldn&#x27;t be &quot;that&quot; bad. For example, I worked at a start-up that successfully made it to $8+b valuation, and they had tons of extremely scary shit. But generally when someone found a critical issue, everybody sighed, rolled up their sleeves and fixed it. Because a security breach, data leakage or data loss that is caused by such negligence is a company extinction event for a start-up. These guys are playing Russian Roulette. Get out before the inevitable occurs.
giantg2超过 2 年前
&quot;Is it the norm for companies&#x2F;startups to not give a damn about security?&quot;<p>More or less, yes. They generally talk about security, but it&#x27;s mostly just lip service. Although I will say your examples are pretty extreme.<p>I once worked on a team as the security champion for a major financial system the company uses internally (thankfully) for trading. There was a problem with SQL injection on every page&#x2F;input we built in that system. And it had schema owner privileges, so you could drop tables and stuff. This is a possibility to happen by accident since there are trade desk devs who could have a tablename collision and accidentslly paste SQL into a field, let alone the malicious possibilities<p>I brought this up with the principle to see which of the two remediation plans he wanted to pursue and what resources he would provide me with for the work. Apparently they wanted to go with their own option of do nothing. They said there&#x27;s an automatic backup of the database in near realtime (forget the name). Would it duplicate dropping tables? How far back can you restore? Has it ever been tested? What are the procedures for restoring? How long to restore (even a 15 minute outage is the end of the world according to the business)? They didn&#x27;t know any of it, and they didn&#x27;t really care to.<p>I promptly left that team. They just wanted a security champion to do paperwork for regulatory compliance. I had no real power to make improvements beyond the smaller stuff could do myself.
zivkovicp超过 2 年前
Your examples seem pretty extreme, and I would say they are definitely not normal. I&#x27;d guess the leadership and engineering quality at this company is sub-par and they probably don&#x27;t even realize the extent of the problem.<p>With that said, my experience is that security issues get taken care of when they are very dangerous, or only after the main product tasks get done. Fixing minor issues in a (NEW) product&#x2F;company that might not survive the year is a comparative waste of time... survival comes first usually.
speedgoose超过 2 年前
It sounds like you care, not no one, so you could assign yourself to these issues and fix them. It’s easier to ask for forgiveness than permission.<p>If you can’t do that, or people get upsets because you did, you should probably start looking for a better job.
herbst超过 2 年前
I worked in a etablished PHP shop that only worked with middle sized to big companies. There was no security other than the default options shipped with the used products.<p>I guess it&#x27;s less about startup culture but more about bad culture in general.
powerhour超过 2 年前
I haven&#x27;t experienced anything this bad. I&#x27;ve seen security lapses and have been able to fix them on my own or with a team, and I don&#x27;t remember ever getting pushback.<p>It&#x27;s probably time to start interviewing. Ideally before your employer&#x27;s security woes become headline news. (Of course, if you&#x27;ve only been there a few months you can easily leave them off your resume once word of the flaws gets out.)
oreally超过 2 年前
Without laws, companies are more concerned about their bottom line before user security. And you can&#x27;t blame them for that - people would rather put food on their table after all, vs something that&#x27;s going to slow you down or at most cause something that causes less damage then you think.
muzani超过 2 年前
This seems to happen more in B2B startups in my experience. I think it&#x27;s because there&#x27;s just more blind trust in B2B, and the success bar is a little lower than B2C. I worked at a company which was testing on production, didn&#x27;t use source control. They messed up hard and frequent with critical customers, including a major media company that could have slandered the hell out of them.<p>That company still didn&#x27;t die and are popular in the community. Natural selection applies in the business world, but some startups really are the cockroaches of the world.<p>That said, it&#x27;s not <i>common</i>. It happens in maybe 2-3 jobs out of 10. Often these are the guys who say yes to everything the customer asks for, which puts them in a peculiar niche.
lasereyes136超过 2 年前
Many will justify it as we will be lucky to survive and grow to a point where a security incident will be a problem.<p>AppSec is never the most important thing on any product manager or product owners list. No one says AppSec isn&#x27;t important, just other things are more important. Sometimes the best you can do is talk them into letting the people that care dedicate some of their time to fixing security issues. While it seems bad, if this is a product or company you care about, working to make it better makes sense. You also might consider adding security concerns into requirements, acceptance criteria, and code reviews (if you have those) to stop it from getting worse.
superchroma超过 2 年前
Yes and no. They&#x27;ll throw a big wad of cash at some provider to get some badly hacked together SSO auth and endpoint monitoring solution but then release insecure garbage running on an ancient copy of android, debian or whatever.
msarrel超过 2 年前
Yes. Startups are deeply focused on revenue. Developing security for a product is considered &quot;extra&quot; and &quot;nice to have&quot;, not essential. That goes double for operations. I have never seen a startup actually practice security unless in preparation for an audit.
sergiotapia超过 2 年前
No, in 15 years working I haven&#x27;t seen anything of that magnitude be ignored. You seem to have found a really bad organization. Something that large always was a drop everything and assign one person to fix it immediately kind of thing.
gitgud超过 2 年前
Some things at certain scales are just not the main priority.<p>This means security might not be valued, but that is a risk the business is taking in order to more resources towards the multitude of problems start-ups face...
zach_garwood超过 2 年前
I wouldn&#x27;t say it&#x27;s abnormal -- startups are in a constant state of SNAFU (situation normal: all fucked up) -- but it&#x27;s definitely not acceptable.
aprdm超过 2 年前
I would say that it isn&#x27;t normal and it seems pretty bad.
danielmarkbruce超过 2 年前
Out of interest, why haven&#x27;t <i>you</i> fixed it?
评论 #32590197 未加载
评论 #32589440 未加载
评论 #32590522 未加载
mountainriver超过 2 年前
Yup “security third” is a very real idea, most startups don’t have time to worry about security much, they have to get a product launched
dev_0超过 2 年前
Yes even big companies don&#x27;t care about security.... it&#x27;s all facade and compliance
评论 #32589925 未加载
GentWhoCodes超过 2 年前
Obligatory GDPR<p>Poorly securing personal data in the UK&#x2F;EU is rather illegal. So no, any reputable shop *will* care about security, ensuring personal data is kept secure and bugs patched as a priority.<p>Going up the food chain, <i>&quot;huge clients which you all heard of, multinationals, some parts of governments&quot;</i> will not be impressed if you are found to be slack when it comes to leaking customers data.
cpach超过 2 年前
This sounds very bad and not normal. I would resign ASAP.