TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Why software 'security debt' is becoming a serious problem for developers

20 点作者 Beggers1960超过 1 年前

5 条评论

jollofricepeas超过 1 年前
This is marketing for Veracode which is crap by the way.<p>You can’t assess for risk without knowing anything about the environment, compensating controls and business logic.<p>Veracode is a check-the-box enterprise compliance tool that reduces engineering productivity and corporate profitability.<p>Yes, vulnerability management is an important problem but Veracode is not the solution not even close.
评论 #39382997 未加载
评论 #39383073 未加载
评论 #39382898 未加载
评论 #39382775 未加载
PeterisP超过 1 年前
Automated detection of risky code can be very useful, but it inherently lacks the capacity to differentiate whether a particular case of bad practice actually is a flaw or not. For a simplified example, usage of eval() in many dynamic languages is potentially risky and <i>could</i> result in a total takeover of the application, so these tools will generally flag it as &#x27;critical&#x27; - even if in that particular case this &#x27;eval&#x27; is run on data that can&#x27;t possibly be affected by any user-controlled input (in that case it was used in a slightly weird design for code generation to save on copypasta) and does not have any security risk.<p>Anecdotally, when I have done triage on such analysis, perhaps 5-10% of things the tools marked as &#x27;critical&#x27; (i.e. <i>potentially</i> critical) were flaws which might have had some actual impact and need to be fixed. So when some vendor says in an article like this &quot;The study found nearly two-thirds (63%) of the applications scanned had flaws in the first-party code&quot;, keep that in mind - they&#x27;re generally treating all detections as real, but it&#x27;s rarely the case.<p>But on the other hand, it may well be the case that it&#x27;s simpler to have a process to just clean up all suspicious places in the code; just as the simplest way to avoid use-after-free errors is to use a garbage-collected language instead of just trying to ensure that every single memory allocation in C is correctly implemented.
评论 #39382974 未加载
评论 #39382948 未加载
mrits超过 1 年前
When I stared in professional software there was almost an extreme paranoia of adding new libraries. Now we have 20 year olds adding whatever they want via NPM.
评论 #39383831 未加载
评论 #39382989 未加载
throwawaaarrgh超过 1 年前
Lol, I haven&#x27;t noticed software developers caring about security any more than they used to. 99% of them don&#x27;t care, and 1% of them are responsible for 75% of secure code. Moreover, there is no consequence if they write insecure code, just like there&#x27;s no consequence if they write unreliable code. They get the same paycheck regardless of the outcome.
ngneer超过 1 年前
Odds are against security. While it is natural to want to automate, programs have a hard time understanding and reasoning about other programs.