loading...
Auth0

Developer's Guide to Common Vulnerabilities and How to Prevent Them

bachiauth0 profile image Bachi Originally published at auth0.com ・1 min read

Sometimes as developers, it can be difficult to keep up with the ever-changing frameworks, tools, and releases. You spend a lot of time fixing bugs, refactoring, and frankly just trying to get your code to run. Understandably, a lot of things get pushed to the lengthy backlog list. But should your application's security ever end up on that list?

The short answer is "no." So how can you keep up with all of your other tasks while also making security a priority? The easiest way is to take some time to understand common vulnerabilities and then make prevention a part of the development process. The form that you built works, but leaves you open to an attack? Then it doesn't work.

Luckily, some of the most common attacks don't actually require much extra work to prevent.

In this article, I'll go over some of the most common vulnerabilities that directly affect developers and how you can make simple changes to prevent them. This is not an exhaustive list, but it's a great place to get started. If you'd like a follow-up to learn about even more vulnerabilities, leave a comment below and let me know.

If you're on desktop, feel free to use the menu to the left to skip around to the vulnerabilities that interest you. Let's get started!

Posted on by:

Auth0

Auth0 offers an identity and access management solution that works out of the box from day one, with the ability to customize, extend, and build new features when you need them. Identity might be complex, but dealing with it shouldn’t be.

Discussion

markdown guide