What is the significance of an app leaking its access token – knowingly/unknowingly with just read access

I am doing a research on an app which has some secret ID. I see that the source code of the app has the secret ID hardcoded inside and the API to request for the access token has just this Secret ID as its query parameter. So ideally it is… Continue reading What is the significance of an app leaking its access token – knowingly/unknowingly with just read access

What would be the most complete procedure to get a simple login system working securely?

I don’t have formal CS education but i’ve written one or 2 little websites. I have troubles communicating even in my native language but i hope this is understandable.
With simple i mean something like we have a single server to authentica… Continue reading What would be the most complete procedure to get a simple login system working securely?

When apps like CI/CD require your github access token, how do they store it securely?

I’m facing a similar situation where I need to store users’ access tokens, but I’m not sure how to securely store them in the server.
I’ve only ever used a security manager for my tokens, and salt hashing passwords but I need to decrypt th… Continue reading When apps like CI/CD require your github access token, how do they store it securely?

AWS AppSync awsconfiguration.json file found in prod apk, is it a security issue and how to verify api key

while fuzzing a public APK file for a bug bounty I came across a file awsconfiguration.json with some pretty promising data. However after reading here https://docs.aws.amazon.com/pdfs/appsync/latest/APIReference/appsync-api.pdf#Welcome a… Continue reading AWS AppSync awsconfiguration.json file found in prod apk, is it a security issue and how to verify api key

Is there any danger in refreshing JWT tokens directly without a refresh token?

So I wrote the following logic for my web app:
When a user interacts with the website it initiates a Backend call. In the backend every endpoint has multiple middlewares, of which there is a JWT verification step, if it succeeds it goes to… Continue reading Is there any danger in refreshing JWT tokens directly without a refresh token?