Blogs

Vulnerabilities Explained …

OWASP Top 10 - Injection What is an Injection? Injection vulnerabilities happen anytime untrusted data is used within a system. Commonly this occurs when a user passes some information to a system and the system starts to interpret the input without validation or sanitization. Examples of Injections …

Testing GIT Hooks Before …

If you’re using GIT hooks and want to be able to test them without adding cruft to your GIT repository, you can easily test individual hooks anytime. GIT hooks are, by default, executable files that can be run through a simple bash command. From your repository $ bash .git/hooks/pre-commit …

CORS, You're Probably …

CORS TL;DR Don’t do Access-Control-Allow-Origin: *❗❗ CORS What is it? Cross-Origin Resource Sharing (CORS) is a way for resources to be shared between domains. A domain is considered to be different when the domain, port, or protocol are not the same as the requesting domain. For example, a …