Articles by Tag #codesecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

The Illusion of Thinking: Why Apple’s Findings Hold True for AI Code Reviews

Recent research has cast new light on the limitations of modern AI “reasoning” models. Apple’s 2025...

Learn More 14 1Jun 17

Automatically fix code vulnerabilities with AI

Explore Snyk Deep Code AI Fix (DCAIF), a game-changer for developers. Unlike generative AI assistants that may introduce security vulnerabilities, DCAIF leverages a hybrid AI model to automatically fix common security issues like XSS right in your IDE.

Learn More 8 0Oct 15 '24

How to mitigate SSRF vulnerabilities in Go

Dive into Server-Side Request Forgery (SSRF) vulnerabilities in Go applications and explore mitigation techniques. Learn how to secure your Go code and leverage tools like Snyk Code for proactive security.

Learn More 4 0Dec 11 '24

Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings

Tired of endless security alerts? Snyk Delta Findings in the IDE helps developers cut through the noise and focus on *new* vulnerabilities introduced in their code. Reduce vulnerability fatigue and ship secure software faster. Get started for free!

Learn More 4 0Mar 19

5 lý do các startup nên cân nhắc sử dụng Locker.io để quản lý secrets

Quản lý secrets luôn là một thách thức đối với các startup, đặc biệt khi quy mô phát triển nhanh và...

Learn More 2 1Jan 16

Identifying Insecure C Code with Valgrind and Fixing with Snyk Code

Discover how to secure your C and C++ code with Snyk. Learn about common vulnerabilities like memory leaks and buffer overflows in C and C++ and how Snyk’s static code analysis tool can help you identify and fix them. Protect your critical software from security threats.

Learn More 2 0Sep 25 '24

Does Claude 3.7 Sonnet Generate Insecure Code?

Anthropic’s Claude 3.7 Sonnet shows improvements in secure code generation, but vulnerabilities like regex-based denial-of-service still emerge. See how it compares to other AI models and why Snyk’s security tools remain essential for developers.

Learn More 2 0Feb 27

How to prevent log injection vulnerability in JavaScript and Node.js applications

Fortify your Node.js applications against log injection attacks! This guide dives deep into the dangers and solutions to protect your logs from malicious manipulation. Stop attackers and build secure Node.js applications today.

Learn More 2 0Sep 27 '24

How to mitigate security issues in GenAI code and LLM integrations

Let's discuss how Snyk can help mitigate three common security issues in genAI code.

Learn More 2 0Sep 13 '24

What you should know about PHP code security

Let's discuss the importance of PHP security and the business impact of some notable PHP interpreter vulnerabilities that are crucial for developers to get right.

Learn More 2 0Sep 5 '24

Revolutionizing Code Security: How Amazon Q Developer Safeguards Modern Applications

In today’s fast-paced digital landscape, where applications power everything from banking to...

Learn More 1 1Dec 23 '24

Aligning Code with Business Goals: The Critical Role of Contextual Code Reviews

As a CTO, VP of Engineering, or Engineering Manager, you understand that code quality is not just...

Learn More 1 0Jun 10

Can Snyk Detect JWT Security Issues?

How to detect and prevent JWT security risks? Follow Snyk’s JWT security best practices for enhanced security.

Learn More 1 0Mar 5

Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5

Weak encryption algorithms are cryptographic algorithms that provide inadequate security against attacks. Find out how Snyk Code can help find weak cryptographic algorithms and with weak cryptography testing.

Learn More 0 0Feb 26

Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Look into the security challenges facing the booming Software-Defined Vehicle (SDV) market. While SDV promises exciting features and revenue streams, its reliance on C and C++ code, notorious for vulnerabilities, raises concerns.

Learn More 0 0Oct 24 '24

Why SCA Should Be Part of Code Review Checks

Software Composition Analysis (SCA) is the practice of scanning applications to identify all...

Learn More 0 0Jun 5

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Learn More 0 0Mar 5

How to Reduce PR Merge Time from 14 Days to Under a Day?

Imagine engineers finishing a new feature, only to see it sit idle in a pull request (PR) queue for...

Learn More 0 1Jun 13

Lottie Player npm package compromised for crypto wallet theft

On October 31st, 2024, another package compromise and cryptocurrency hijack story unfolded for a popular npm package. Scan open source dependencies and container images in the CLI or your SCM with Snyk to determine if you're using one of the vulnerable versions of lottie-player, and potentially uncover any other security vulnerabilities you may have in your projects.

Learn More 0 0Nov 1 '24

Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code

Snyk Code's enhanced dataflow analysis simplifies vulnerability identification and remediation. Learn how this powerful tool streamlines the security process and saves developers valuable time.

Learn More 0 0Oct 11 '24

Ultralytics AI Pwn Request Supply Chain Attack

Discover the details of the Ultralytics AI supply chain attack, a sophisticated two-phase breach targeting PyPI releases and GitHub Actions with cryptocurrency mining malware. Learn how to detect exposure, secure your projects, and protect against future vulnerabilities using tools like Snyk.

Learn More 0 0Dec 12 '24

Finding Software Flaws Early in the Development Process Provides Clear ROI

The Consortium for Information and Software Quality estimated that the cost of poor software quality in the United States reached $2.41 trillion in 2022. As we will show, it makes sense that the cost of poor software quality is so high. It’s also completely avoidable, and software flaws must be avoided with the world’s increased dependency on software.

Learn More 0 1Jun 13

Want to see real vulnerabilities in your repos? We’re testing agentic analysis for logic vulnerabilities

Hey everyone 👋 We’re building an agentic static analysis tool that goes beyond pattern matching to...

Learn More 0 0Jul 11

Build vs. Buy: Panto’s Take on AI Code Reviews and Code Security

Build vs. Buy: Panto’s Take on AI Code Reviews and Code Security | Panto AI As we talk to...

Learn More 0 0Jun 3

Do not pass GO - Malicious Package Alert

Recently, researchers have found another Software Supply Chain issue in BoltDB, a popular database tool in the Go programming environment. The BoltDB Go Module was found backdoored and contained hidden malicious code.

Learn More 0 0Feb 13