TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Looking for security trouble spots in Go code

45 点作者 leef大约 10 年前

1 comment

steakejjs大约 10 年前
I actually wrote a tool[0] to attack gorilla sessions that are mentioned at the bottom of this, and gave a talk on some security functions in Go.<p>The big take-aways from my talk. Go doesn&#x27;t have a lot of unsafe functions.<p>HTMLTemplates package and exec package are very resistant to common web attacks, so much so that I had trouble writing vulnerable code to XSS and RCE<p>As for the tool that attacks Gorilla Sessions, I found a lot of people on github who were not initializing their session securely. Most people in the first 30 pages of github search were doing it wrong. This is most likely a pretty widespread issue. It seems they didn&#x27;t realize this was an AES key...The blog post is not completely correct saying it will be used for an HMAC. It will...but it is also used as an AES key.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;steakejjs&#x2F;G2B2" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;steakejjs&#x2F;G2B2</a>
评论 #9379275 未加载
评论 #9378905 未加载