Beating the OWASP Benchmark

This post is an update to a previous research post authored by ShiftLeft’s Chief Scientist, Fabian Yamaguchi (https://blog.shiftleft.io/beating-the-owasp-benchmark-24a7b1601031). In the last article, he evaluated ShiftLeft’s static analysis tool agains… Continue reading Beating the OWASP Benchmark

Intro to the Content Security Policy (CSP)

What you need to know about CSP, a fundamental defense mechanism of the Internet.
Photo by Florian Olivo on Unsplash
There are many decisions that go into the process of creating a secure website. One of these decisions is selecting which HTTP security… Continue reading Intro to the Content Security Policy (CSP)

Managing Open Source Vulnerabilities

When you test your code, are you really testing all of it?
Photo by Artem Sapegin on Unsplash
It seems impossible to write software without using open-source components. A single “import package” can mean thousands of lines of code added to an applicat… Continue reading Managing Open Source Vulnerabilities

Detecting Sensitive Data Leaks That Matter

How to scan for PII leaks, credentials, and other sensitive data leaks using data flows.
Last time, I talked about the perils of leaving secrets in open-sourced code and how to detect those secrets using regex and entropy analysis.
Scanning for Secrets… Continue reading Detecting Sensitive Data Leaks That Matter

Scanning for Secrets in Source Code

How to uncover leak secrets with regex + entropy analysis
Image is taken from https://twitter.com/DZoneInc/status/1361420207793659904.
As a developer, I admit that I’ve committed secrets to public Github repositories before. Hardcoded secrets have alwa… Continue reading Scanning for Secrets in Source Code

Preventing XXE in Java Applications

Impact, exploitation, and prevention of XML External Entity Vulnerabilities
Photo by Piotr Chrobot on Unsplash
Welcome back to AppSec simplified! In this tutorial, we are going to talk about how you can prevent XXEs in Java applications. If you are not… Continue reading Preventing XXE in Java Applications

Detecting and Exploiting XXEs: AppSec Simplified

Finding XXE vulnerabilities in applications via code analysis
Welcome back to AppSec Simplified! Last time, we talked about the fascinating XXEs vulnerabilities and how they can affect your application. If you are not already familiar with XXEs, please… Continue reading Detecting and Exploiting XXEs: AppSec Simplified