Much of the tooling and educational content around machine learning is focused on Python and its...
Often the questions posed to software developers is whether AI will replace them. If you’re a...
Large Language Models have made it into mainstream fields of technologies, beyond code generation,...
In the next set of examples we will review some common scenarios of tight coupling in Node.js...
server-side security challenges
You probably caught up on the title that we are going to mention two different npm packages to handle...
How does the JavaScript ecosystem tooling looks like in 2025 for TypeScript developers and publishing...
In a prior article I’ve written how to block client devices in your LAN from accessing YouTube on...
The Astro framework powers this personal blog, my Node.js Secure Coding website, and now my newly...
In this write-up I will describe how to setup a Google Cloud project (on GCP) and use it to store...
Imagine if we applied behavioral economics principles to application security methodologies and...
The Astro frontend framework is such a delight to work with but I was missing a feature with regards...
If you often encounter scenarios where managing asynchronous operations efficiently is crucial but...
Hey there fellow Vue.js enthusiasts! 👋 Ever found yourself wrestling with data fetching in your...
The JavaScript ecosystem is well known for its use of small packages (left-pad anyone?) and being a...
The Large Language Model (LLM) hype train is in full swing even two years after the release of the...
We’ve been increasingly accustomed to subscription-based economic model, which did not skip the GenAI...
Installing Playwright on Heroku is a bit more involved than just running npm install playwright and...
It’s ok to roll your own authentication if you want to build that into your Express applications, but...
I use Home Assistant to manage my smart home devices and AdGuard Home to block ads, lower bandwidth...
I’m building a side-project on Firebase and as it usually is with overly abstracted platforms, the...
So, you’ve got this fantastic website, and you’re ready to share it with the world. But wait, have...
Bootstrapping a Node.js application often requires loading configuration, whether from environment...
Often smart home automation enthusiasts want to access their Home Assistant instance remotely. This...
Crafting robust and maintainable applications is no small feat. One of the fundamental pillars of...
Here’s the use-case: A parent Vue.js component needs to pass data to a child component. It does so...
Background job processing is a technique for running tasks that can take a long time to complete in a...
This article explores real-world command injection vulnerabilities that have impacted popular applications, emphasizing the need for secure coding practices. We take you through the background of Node.js and its vast user base, setting the stage for understanding the gravity of command injection attacks.
Command injection vulnerabilities pose a significant threat to Node.js and JavaScript applications' security. By understanding the risks involved, referencing real-world incidents, and following best practices, developers can effectively mitigate these vulnerabilities. Remember, validating and sanitizing user input, utilizing command argument separation, and following the least privilege principle are essential steps toward creating secure applications.
Were you tasked with building a product that requires the execution of dynamic JavaScript originating...