Articles by Tag #codesecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Preventing SQL injection in C# with Entity Framework

In this blog, we'll discuss strategies to protect your C# code from SQL injection.

Learn More 11 0Jul 31 '24

Automatically fix code vulnerabilities with AI

Explore Snyk Deep Code AI Fix (DCAIF), a game-changer for developers. Unlike generative AI assistants that may introduce security vulnerabilities, DCAIF leverages a hybrid AI model to automatically fix common security issues like XSS right in your IDE.

Learn More 8 0Oct 15 '24

Essential Node.js backend examples for developers in 2024

Boost your Node.js skills with these backend code snippets for 2024. Copy and paste them into your own projects to save time when building backends.

Learn More 6 4Jun 13 '24

Preventing broken access control in express Node.js applications

In this article, you'll learn more about broken access control in Node.js applications and strategies to prevent such vulnerabilities when building web applications based on the Express web framework.

Learn More 5 0May 23 '24

Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk

In this blog, we'll show how you can use Snyk to locate hardcoded secrets and credentials and then refactor our code to use Doppler to store those secrets instead.

Learn More 4 0Jun 26 '24

Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings

Tired of endless security alerts? Snyk Delta Findings in the IDE helps developers cut through the noise and focus on *new* vulnerabilities introduced in their code. Reduce vulnerability fatigue and ship secure software faster. Get started for free!

Learn More 4 0Mar 19

How to mitigate SSRF vulnerabilities in Go

Dive into Server-Side Request Forgery (SSRF) vulnerabilities in Go applications and explore mitigation techniques. Learn how to secure your Go code and leverage tools like Snyk Code for proactive security.

Learn More 4 0Dec 11 '24

Symmetric vs. asymmetric encryption: Practical Python examples

In this guide, we’ll discuss symmetric and asymmetric encryption, implement them in Python, and explore their best practices.

Learn More 3 0May 16 '24

How to mitigate security issues in GenAI code and LLM integrations

Let's discuss how Snyk can help mitigate three common security issues in genAI code.

Learn More 2 0Sep 13 '24

5 lý do các startup nên cân nhắc sử dụng Locker.io để quản lý secrets

Quản lý secrets luôn là một thách thức đối với các startup, đặc biệt khi quy mô phát triển nhanh và...

Learn More 2 1Jan 16

Breaking caches and bypassing Istio RBAC with HTTP response header injection

This post outlines what we believe to be novel attacks against HTTP application middleware based on the simple foundation of HTTP response header injection.

Learn More 2 0Jun 21 '24

How to prevent log injection vulnerability in JavaScript and Node.js applications

Fortify your Node.js applications against log injection attacks! This guide dives deep into the dangers and solutions to protect your logs from malicious manipulation. Stop attackers and build secure Node.js applications today.

Learn More 2 0Sep 27 '24

Identifying Insecure C Code with Valgrind and Fixing with Snyk Code

Discover how to secure your C and C++ code with Snyk. Learn about common vulnerabilities like memory leaks and buffer overflows in C and C++ and how Snyk’s static code analysis tool can help you identify and fix them. Protect your critical software from security threats.

Learn More 2 0Sep 25 '24

Does Claude 3.7 Sonnet Generate Insecure Code?

Anthropic’s Claude 3.7 Sonnet shows improvements in secure code generation, but vulnerabilities like regex-based denial-of-service still emerge. See how it compares to other AI models and why Snyk’s security tools remain essential for developers.

Learn More 2 0Feb 27

Vulnerabilities in NodeJS C/C++ add-on extensions

In this blog post, we aim to provide an overview of common security vulnerabilities and vulnerable patterns that can occur when writing C/C++ add-ons in NodeJS.

Learn More 2 0Aug 15 '24

What you should know about PHP code security

Let's discuss the importance of PHP security and the business impact of some notable PHP interpreter vulnerabilities that are crucial for developers to get right.

Learn More 2 0Sep 5 '24

How to secure a REST API?

In this post, we'll discuss what REST APIs are and how to secure them.

Learn More 2 0Jun 28 '24

Four easy ways to analyze your Java and Kotlin code

In this post, we'll cover four simple methods for finding security vulnerabilities in your Java and Kotlin code.

Learn More 2 0Aug 14 '24

Can Snyk Detect JWT Security Issues?

How to detect and prevent JWT security risks? Follow Snyk’s JWT security best practices for enhanced security.

Learn More 1 0Mar 5

Revolutionizing Code Security: How Amazon Q Developer Safeguards Modern Applications

In today’s fast-paced digital landscape, where applications power everything from banking to...

Learn More 1 1Dec 23 '24

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Learn More 0 0Mar 5

Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code

Snyk Code's enhanced dataflow analysis simplifies vulnerability identification and remediation. Learn how this powerful tool streamlines the security process and saves developers valuable time.

Learn More 0 0Oct 11 '24

Ultralytics AI Pwn Request Supply Chain Attack

Discover the details of the Ultralytics AI supply chain attack, a sophisticated two-phase breach targeting PyPI releases and GitHub Actions with cryptocurrency mining malware. Learn how to detect exposure, secure your projects, and protect against future vulnerabilities using tools like Snyk.

Learn More 0 0Dec 12 '24

Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Look into the security challenges facing the booming Software-Defined Vehicle (SDV) market. While SDV promises exciting features and revenue streams, its reliance on C and C++ code, notorious for vulnerabilities, raises concerns.

Learn More 0 0Oct 24 '24

Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5

Weak encryption algorithms are cryptographic algorithms that provide inadequate security against attacks. Find out how Snyk Code can help find weak cryptographic algorithms and with weak cryptography testing.

Learn More 0 0Feb 26

Lottie Player npm package compromised for crypto wallet theft

On October 31st, 2024, another package compromise and cryptocurrency hijack story unfolded for a popular npm package. Scan open source dependencies and container images in the CLI or your SCM with Snyk to determine if you're using one of the vulnerable versions of lottie-player, and potentially uncover any other security vulnerabilities you may have in your projects.

Learn More 0 0Nov 1 '24

Do not pass GO - Malicious Package Alert

Recently, researchers have found another Software Supply Chain issue in BoltDB, a popular database tool in the Go programming environment. The BoltDB Go Module was found backdoored and contained hidden malicious code.

Learn More 0 0Feb 13