Bio
Developer Advocate for Snyk and Software Engineer with over 10 years of hands-on experience in creating and maintaining software. He is passionate about Java, (Pure) Functional Programming and Cybersecurity. Brian is an Oracle Groundbreaker Ambassador, Utrecht JUG Co-lead, Virtual JUG organizer and Co-lead at MyDevSecOps. He is a regular international speaker on mostly Java-related conferences like JavaOne, Oracle Code One, Devoxx BE, Devoxx UK, Jfokus, JavaZone and many more. Besides all that Brian is a military reserve for the Royal Netherlands Air Force and a Taekwondo Master / Teacher.
Outline
Open source modules are undoubtedly awesome. However, they also represent an undeniable and massive risk. Youβre introducing someone elseβs code into your system, often with little or no scrutiny. The wrong package can introduce severe vulnerabilities into your application, exposing your application and your user's data. This talk will use a sample application, Goof, which uses various vulnerable dependencies, which we will exploit as an attacker would. For each issue, we'll explain why it happened, show its impact, and β most importantly β see how to avoid or fix it. We'll live hack exploits like the classic struts vulnerability that recently made it famous, along with Spring Break and several others.
Here is a download link to the talk slides (PDF)
This talk will be presented as part of CodeLand:Distributed on July 23. After the talk is streamed as part of the conference, it will be added to this post as a recorded video.
Top comments (39)
So happy to hear about security through development, thanks for introducing this topic, Brian.
Yeah definitely
As a beginner, this is all new to me but glad I'm learning it now rather than later!
Wow. This talk makes me pretty scared. But also makes me feel like I want to learn how to hack :)
I feel exactly the same! I'm definitely going to dive down a DevOps rabbit hole to try to learn more.
I think that's exactly how the talk should make us feel π
This talk is so important, dependencies break code many times.
Are there tools to check if your site is secure? This talk is definitely highlighting the fact that I need to learn security!
Take a look at snyk.io to help you out.
Another cool thing would be to install the Vuln Cost extension if you are using VSCode
Thank you so much for answering my question. That's a great tip!
Wow, this is really eye-opening! I never thought about the fact that we borrow so much.
The "left pad" moment was a real moment for my own discovery here π
This is must-watch.
Thanks for the talk Brian.
He is so informative. I want to be him when I "grow up"
Don't ever grow up :)
At least that is what they told me ;)
I wish I would've gotten that advice! Guess that's why I'm starting my coding journey so late! I'm very interested in dev sec ops. I never knew that existed before your talk. Thanks again.
Are there any recommended sources for learning more about DevSecOps and how to implement it? Specifically towards an organization that is not yet using DevOps but would like to?
There is a bunch of stuff.
I just transitioned from product engineer to DevOps this quarter, and starting to learn to I should care about these things. Thank you so much for your contribution, @brianverm !
I'm having a lot of fun, I'm loving this, I'm only missing a popcorn bag here. How smoothly you are breaking things!
what a super interesting person
This exploit sounds like Arbitrary Code Execution as a Service.
Looking forward to learning a lot from this talk π₯