DEV Community 👩‍💻👨‍💻

Discussion on: What's your spookiest coding story?

olistik profile image

What about "endemic" stack traces in production logs?

A password that when entered with any of the e-mail addresses lets you impersonate that user..

A 10+ years old codebase with no test coverage at all..

APIs with no authentication and only the thin protection of a VPN..

Millions of personal records stored and processed without the user consent..