<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dogan</title>
    <description>The latest articles on DEV Community by Dogan (@doganm95).</description>
    <link>https://dev.to/doganm95</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2427272%2F2623c827-8e54-48e2-bfb8-8df491083c6f.jpg</url>
      <title>DEV Community: Dogan</title>
      <link>https://dev.to/doganm95</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/doganm95"/>
    <language>en</language>
    <item>
      <title>Cybersecurity: Scan your hosts, before vulnerabilities cost you millions</title>
      <dc:creator>Dogan</dc:creator>
      <pubDate>Wed, 24 Sep 2025 12:28:46 +0000</pubDate>
      <link>https://dev.to/doganm95/your-endpoints-are-the-weakest-link-scan-them-before-they-cost-you-millions-he2</link>
      <guid>https://dev.to/doganm95/your-endpoints-are-the-weakest-link-scan-them-before-they-cost-you-millions-he2</guid>
      <description>&lt;p&gt;In the now AI-heavy world, where vibe coding with &lt;a href="https://www.code-intelligence.com/blog/risks-of-ai-generated-code#:~:text=While%20AI%2Dgenerated%20code%20can,a%20study%20by%20Stanford%20University" rel="noopener noreferrer"&gt;AI creates more vulnerabilities&lt;/a&gt; than ever before, tiny mistakes and forgotten host settings are becoming the root cause of catastrophic breaches. Backend logic bugs, insecure APIs, and simple host misconfigurations have repeatedly enabled mass compromises, like these for example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;MOVEit Transfer – SQL injection in a file-transfer product&lt;/strong&gt;
&lt;em&gt;Damage:&lt;/em&gt; Mass exploitation across thousands of organizations; tens of millions of records stolen. &lt;a href="https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf" rel="noopener noreferrer"&gt;source&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kia/Hyundai Portal – Broken API authorization&lt;/strong&gt;
&lt;em&gt;Damage:&lt;/em&gt; Remote vehicle unlock/start and tracking across millions of cars. &lt;a href="https://www.wired.com/story/kia-web-vulnerability-vehicle-hack-track/" rel="noopener noreferrer"&gt;source&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pegasus Airlines – Publicly exposed cloud storage (S3)&lt;/strong&gt;
&lt;em&gt;Damage:&lt;/em&gt; Terabytes of internal data and PII left accessible without authentication. &lt;a href="https://www.techmonitor.ai/technology/cybersecurity/pegasus-airline-data-breach-aws-bucket" rel="noopener noreferrer"&gt;source&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ivanti EPMM – API auth bypass + remote code execution&lt;/strong&gt;
&lt;em&gt;Damage:&lt;/em&gt; Full compromise of mobile endpoint management servers, enabling control of enterprise devices. &lt;a href="https://www.techradar.com/pro/security/cisa-flags-some-more-serious-ivanti-software-flaws-so-patch-now" rel="noopener noreferrer"&gt;source&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These incidents share a pattern: an attacker found a small gap in an API or a misconfiguration on a host and scaled it into a major breach. That gap could be in your &lt;code&gt;/login&lt;/code&gt; route, an exposed admin port, or a misapplied IAM policy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why fear is not the strategy — action is
&lt;/h2&gt;

&lt;p&gt;Panicing is not the solution: continuously scan your endpoints and hosts with tools designed to find real-world misconfigurations and backend logic flaws. Fix what scanners find, iterate, ship with confidence and start sleeping well again.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introducing: Endpoint Vulnerability &amp;amp; Host Scanner (API)
&lt;/h2&gt;

&lt;p&gt;We built a focused scanning API to find exactly those gaps that lead to supply-chain and backend compromises.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Some examples of what it does (high level)&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scans common and custom HTTP endpoints for auth/authorization flaws, broken object-level access, insecure JWT usage, and common injection vectors.
&lt;/li&gt;
&lt;li&gt;Detects exposed ports and host misconfigurations (public DB endpoints, management consoles, insecure S3-like buckets).
&lt;/li&gt;
&lt;li&gt;Runs checks for common automation/CI pitfalls (misapplied environment variables, leaked secrets, permissive IAM configurations).
&lt;/li&gt;
&lt;li&gt;Produces machine-readable reports (JSON) and human summaries you can share with teams.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Why it’s different&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It focuses on endpoint/server-side logic and host misconfiguration — the exact root causes behind MOVEit, Ivanti, and other supply-chain attacks&lt;/li&gt;
&lt;li&gt;API-first: integrate scans into CI/CD, pre-release gates, or run ad-hoc checks from your own tooling (using wbhooks)&lt;/li&gt;
&lt;li&gt;Free plan for individuals: scan your most critical routes (&lt;code&gt;/login&lt;/code&gt;, &lt;code&gt;/signup&lt;/code&gt;, webhooks, admin panels) and verify you haven't accidentally exposed a sensitive port or service&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How to try it&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Find the &lt;a href="https://rapidapi.com/DoganM95/api/endpoint-vulnerability-scanner1" rel="noopener noreferrer"&gt;API listing &amp;amp; docs here&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Free tier available — no credit card required. Add scans to CI/CD or trigger on push for fast feedback (receiving the report json as an e-mail)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Quick checklist to reduce blast radius (do these now)
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Block management interfaces from the public internet; use VPNs or private networking&lt;/li&gt;
&lt;li&gt;Enforce least-privilege on IAM roles and storage buckets, and enable organization-level block-public-access&lt;/li&gt;
&lt;li&gt;Harden APIs: require strong authentication, validate authorization server-side (never trust client-supplied IDs), and enforce rate limits!
&lt;/li&gt;
&lt;li&gt;Automate scanning: add endpoint checks into PR/CI pipelines and schedule daily/weekly host scans&lt;/li&gt;
&lt;li&gt;Monitor and alert on unusual outbound transfers and new public endpoints&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Final word
&lt;/h2&gt;

&lt;p&gt;The single misconfiguration or broken API that goes unnoticed today is the headline you’ll regret tomorrow. Scan early, scan often, and automate the fixes where possible. If you want, run one free scan now via the API and see what your most critical endpoints look like.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://rapidapi.com/DoganM95/api/endpoint-vulnerability-scanner1" rel="noopener noreferrer"&gt;Try the API on RapidAPI&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy scanning. Stay secure.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>vulnerabilities</category>
      <category>security</category>
    </item>
    <item>
      <title>Spoken — Instantly Get Spotify API Access Tokens via OAuth Without the Hassle</title>
      <dc:creator>Dogan</dc:creator>
      <pubDate>Thu, 05 Jun 2025 20:01:22 +0000</pubDate>
      <link>https://dev.to/doganm95/spoken-instantly-get-spotify-api-access-tokens-via-oauth-without-the-hassle-1lg7</link>
      <guid>https://dev.to/doganm95/spoken-instantly-get-spotify-api-access-tokens-via-oauth-without-the-hassle-1lg7</guid>
      <description>&lt;p&gt;Spoken now has a free plan! Instantly generate &lt;strong&gt;Spotify API access tokens&lt;/strong&gt; — no OAuth setup, no redirect handling, no hassle.&lt;/p&gt;

&lt;p&gt;Use our HTTP API or Website to get Authorization Code tokens with full access privileges.&lt;/p&gt;

&lt;p&gt;Start building faster. Happy tinkering!&lt;/p&gt;

</description>
      <category>spotify</category>
      <category>api</category>
      <category>oauth</category>
      <category>saas</category>
    </item>
    <item>
      <title>How spoken.host Simplifies Spotify API Authentication</title>
      <dc:creator>Dogan</dc:creator>
      <pubDate>Wed, 13 Nov 2024 14:00:03 +0000</pubDate>
      <link>https://dev.to/doganm95/how-spokenhost-simplifies-spotify-api-authentication-1hci</link>
      <guid>https://dev.to/doganm95/how-spokenhost-simplifies-spotify-api-authentication-1hci</guid>
      <description>&lt;h2&gt;
  
  
  Introduction: A Frustration-Free Spotify API Experience
&lt;/h2&gt;

&lt;p&gt;Are you tired of jumping through hoops to generate Spotify API tokens? Let’s face it, dealing with the Spotify authorization flow can feel like solving a Rubik’s Cube while blindfolded. You’re just trying to make an app that plays music or analyzes playlists, and yet you’re stuck Googling &lt;em&gt;“Spotify API token generator for dummies.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Enter &lt;strong&gt;&lt;a href="https://spoken.host" rel="noopener noreferrer"&gt;spoken.host&lt;/a&gt;&lt;/strong&gt;: the SaaS solution that simplifies Spotify API authentication so you can focus on building, not debugging. Whether you’re a hobbyist developer or managing a team, we’ve got your back with easy, efficient, and rate-limited access to Spotify tokens.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem: Why Spotify’s API Can Feel Like a Maze
&lt;/h2&gt;

&lt;p&gt;Spotify’s API is powerful but comes with a significant hurdle: &lt;strong&gt;authorization flow&lt;/strong&gt;. Here’s what developers typically face:  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdeveloper.spotify.com%2Fimages%2Fdocumentation%2Fweb-api%2Fauth-code-flow.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdeveloper.spotify.com%2Fimages%2Fdocumentation%2Fweb-api%2Fauth-code-flow.png" width="800" height="726"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Confusing OAuth setup&lt;/strong&gt;: Figuring out client IDs, client secrets, and redirect URIs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Token expiration headaches&lt;/strong&gt;: Access tokens expire in an hour, so you’re constantly refreshing them.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Manual workflow interruptions&lt;/strong&gt;: Nobody has time for repeated API calls just to test features.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For small projects or quick prototypes, this complexity feels like overkill. You might even end up abandoning the idea altogether. (Don’t worry, we’ve all been there.)&lt;/p&gt;

&lt;h2&gt;
  
  
  The Solution: What Is spoken.host?
&lt;/h2&gt;

&lt;p&gt;spoken.host is a &lt;strong&gt;developer-friendly SaaS&lt;/strong&gt; that provides instant, reliable access tokens for Spotify’s API. Here’s how it works (simplified):&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Sign Up&lt;/strong&gt;: Create an account on spoken.host.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Subscribe to a Plan&lt;/strong&gt;: Choose a plan that suits your usage needs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authenticate&lt;/strong&gt;: Enter your Spotify credentials (client ID, secret, etc.).
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Access Tokens on Demand&lt;/strong&gt;: Get tokens directly through our UI or via authenticated HTTP requests, rate-limited to up to 60 tokens/hour with 1 token/second.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;No more worrying about token expiry or handling refresh logic. spoken.host takes care of the heavy lifting so you can focus on writing awesome code.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The UI&lt;/strong&gt;: Log in and grab your tokens in seconds.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The API&lt;/strong&gt;: Automate token requests in your projects with our secure and rate-limited endpoints.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rate Limiting&lt;/strong&gt;: Designed to prevent abuse while ensuring smooth usage for legitimate developers.
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Imagine you’re building a playlist analysis app. With spoken.host, you can focus on parsing Spotify’s data instead of wrangling OAuth flows.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Who Is spoken.host For?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Developers&lt;/strong&gt;: Whether you’re a solo dev or part of a team, our service simplifies your workflow.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Data Analysts&lt;/strong&gt;: Need Spotify data for machine learning or visualization? spoken.host streamlines the process.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hobbyists&lt;/strong&gt;: Building your dream app? We’ll save you time and headaches.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Lessons From Building spoken.host
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Inspiration from Levelsio (and Twitter Shenanigans)
&lt;/h3&gt;

&lt;p&gt;I’ve always admired Pieter Levels (&lt;a class="mentioned-user" href="https://dev.to/levelsio"&gt;@levelsio&lt;/a&gt; on Twitter) for his ability to build bootstrapped SaaS businesses that solve real problems. spoken.host was inspired by this philosophy: create something simple, useful, and available to the world.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. The Reality of Building a Company in Germany
&lt;/h3&gt;

&lt;p&gt;Now, let me tell you about &lt;strong&gt;starting a company in Germany&lt;/strong&gt;. Imagine a sloth running a marathon. That’s how fast the process feels. From registration to getting approval to &lt;strong&gt;actually being allowed to earn money&lt;/strong&gt;, it took &lt;strong&gt;six months&lt;/strong&gt;. By the time everything was finalized, I’d practically forgotten what my idea was about.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Taxes, Payment Methods, and Other Joys
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;VAT (Mehrwertsteuer)&lt;/strong&gt;: Oh, you thought you’d keep most of what you earn? Cute.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Payment Providers&lt;/strong&gt;: Stripe takes a cut, your accountant takes a cut, and the government takes…well, &lt;em&gt;a lot&lt;/em&gt;.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Profit Reality&lt;/strong&gt;: For every €10 you make, you’ll see maybe €4. If you’re lucky.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But hey, I’m not bitter (okay, maybe a little). It’s all part of the journey.&lt;/p&gt;

&lt;h2&gt;
  
  
  Humorous Challenges Along the Way
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Testing Spotify’s Rate Limits:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
“Let’s see what happens if I request 1,000 tokens in a second… Oh, the API yelled at me. Cool.”  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Naming the Service:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
I wanted something cool and catchy. After discarding &lt;em&gt;Tokenator 3000&lt;/em&gt; and &lt;em&gt;Authomatic&lt;/em&gt;, I landed on Spoken (&lt;strong&gt;Spo&lt;/strong&gt;tify-To*&lt;em&gt;ken&lt;/em&gt;*)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Building and Shipping:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
You think coding is hard? Try explaining to your relatives at Christmas what a &lt;em&gt;Spotify API token&lt;/em&gt; is. (“So… it plays music?” “Not exactly.”)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion: Why Spoken.host Is Worth a Try
&lt;/h2&gt;

&lt;p&gt;Spoken.host exists to make your life as a developer easier. Whether you’re building the next viral app or just tinkering with Spotify’s API for fun, we’re here to save you time, energy, and a few gray hairs.&lt;/p&gt;

&lt;p&gt;And if you’re curious about the ups and downs of building a SaaS in Germany, you now know the good, the bad, and the tax-heavy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ready to Simplify Your Workflow?
&lt;/h2&gt;

&lt;p&gt;Check us out at &lt;a href="https://spoken.host" rel="noopener noreferrer"&gt;spoken.host&lt;/a&gt; and start your journey to hassle-free Spotify development today! 🎧&lt;/p&gt;

</description>
      <category>spotify</category>
      <category>api</category>
      <category>accesstoken</category>
      <category>authentication</category>
    </item>
  </channel>
</rss>
