In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.| Include Security Research Blog
This article highlights some common OAuth vulnerabilities found in web and mobile apps in 2021, along with some mitigations to improve security.| Nordic APIs
Learn about cross-site scripting attacks, the risk they pose to sensitive information, and how to protect against XSS.| Outpost24
Dave Peck's home on the web. Dave is an independent software developer, investor, and civic technologist.| davepeck.org
Follow these six steps to resolve a source code leak, associated costs, and negative public reaction & learn how to secure your source code.| Spectral
One of the most common proposed solutions to prompt injection attacks (where an AI language model backed system is subverted by a user injecting malicious input—“ignore previous instructions and do …| Simon Willison’s Weblog
Introducing Trusted Types: a browser API to prevent DOM-based cross-site scripting in modern web applications.| web.dev
Vulnerability scanning is a process of identifying and assessing security weaknesses in a computer system, network, or web application. Vulnerabilities can range from technical flaws in software, hardware or configuration issues to vulnerabilities in policies and procedures.| PurpleSec
Cross-Site Scripting (XSS) happens when attackers send malicious scripts via web apps to end users. Learn how to remediate it in GraphQL apps.| Escape - The API Security Blog
Security testing starts with understanding vulnerabilities. The CVE website lists known software flaws. The OWASP Top Ten highlights common weaknesses. With this knowledge, we can improve our Go development. This article shows how to put in place robust practices. They are to: fuzz inputs, verify dependencies, and use static analysis tools (SAST).| Jakub Jarosz
htmx gives you access to AJAX, CSS Transitions, WebSockets and Server Sent Events directly in HTML, using attributes, so you can build modern user interfaces with the simplicity and power of hypertext htmx is small (~14k min.gz’d), dependency-free, extendable, IE11 compatible & has reduced code base sizes by 67% when compared with react| htmx.org
Discover essential techniques for performing secure code reviews to identify and fix vulnerabilities, ensuring robust software security.| Spectral
When building landing pages and blogs, we usually want to have some traffic data and its analytics. Monitoring activity on our web pages turns out to be quite useful ... Similarly, when we build web applications, we want to have analytical data to understand the behaviors and interactions of our users.| binaryigor.com
A fairly common security bug report is of the form: “I can put JavaScript inside a PDF file and it runs!” For example, open this PDF file with Chrome, and you can see the alert(1) messa…| text/plain
Explore CKBox: the top CKFinder alternative for advanced file management. Learn more about its configuration, security and unique features.| ckeditor.com
Microsoft Vulnerability Severity Classification for Online Services | www.microsoft.com
A reflected cross site scripting vulnerability exists on the ‘id’ parameter of the Wordpress Marmoset Viewer plugin. A threat actor can utilize a specially crafted payload and append it to the id parameter included in the Marmoset Viewer. The cross site scripting vulnerability can lead to the potential theft of cookies or credentials, giving the threat actor the ability to take over a victim’s account or steal other sensitive information.| johnjhacking.com
A (very) belated follow up to Getting Started with Microformats 2, covering the basics of consuming and using microformats 2 data. Originally posted on waterpigs.co.uk.| Microformats
Template directives are a special kind of HTML attribute available inside of any Astro component template (.astro files), and some can also be used in .mdx files.| Docs
Learn why HTTP cookies are needed, how they're used on the client and server side, where they're stored, and how they impact security and privacy on the web.| www.aleksandrhovhannisyan.com
Some time ago I came across a site that was using xdLocalStorage after I had been looking into the security of HTML5 postMessage. I found that the library had several common security flaws around l…| GrimBlog
Website with the collection of all the cheat sheets of the project.| cheatsheetseries.owasp.org
Website with the collection of all the cheat sheets of the project.| cheatsheetseries.owasp.org
Website with the collection of all the cheat sheets of the project.| cheatsheetseries.owasp.org
Cross Site Request Forgery (CSRF) on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.| owasp.org
Cross Site Scripting (XSS) on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.| owasp.org