loading...

Secure code review Series' Articles

Back to Brian Vermeer 🧑🏼‍🎓🧑🏼‍💻's Series
Secure code review: Part 1 - Sanitize and validate all input

Secure code review: Part 1 - Sanitize and validate all input

Reactions 20
2 min read
Secure code review: Part 2 - Never store secrets as code

Secure code review: Part 2 - Never store secrets as code

Reactions 5
2 min read
Secure code review: Part 3 - Test for vulnerabilities introduced by dependencies

Secure code review: Part 3 - Test for vulnerabilities introduced by dependencies

Reactions 4
2 min read
Secure code review: Part 4 - Enforce secure authentication

Secure code review: Part 4 - Enforce secure authentication

Reactions 2
2 min read
Secure code review: Part 5 - Least privilege principle

Secure code review: Part 5 - Least privilege principle

Reactions 11
2 min read
Secure code review: Part 6 - Handling sensitive data

Secure code review: Part 6 - Handling sensitive data

Reactions 8
3 min read
Secure code review: Part 7 - Well-known attacks

Secure code review: Part 7 - Well-known attacks

Reactions 5
3 min read
Secure code review: Part 8 - Statically testing

Secure code review: Part 8 - Statically testing

Reactions 4
2 min read
Secure code review: Bonus - Who reviews the code?

Secure code review: Bonus - Who reviews the code?

Reactions 7
2 min read