dev-resources.site
for different kinds of informations.
opensourcesecurity Article's
30 articles in total
Join a Webinar on OSS
read article
๐๐ข๐ ๐ฒ๐จ๐ฎ ๐ค๐ง๐จ๐ฐ ๐ญ๐ก๐๐ญ ๐จ๐ฏ๐๐ซ ๐๐% ๐จ๐ ๐จ๐ฉ๐๐ง-๐ฌ๐จ๐ฎ๐ซ๐๐ ๐๐จ๐ฆ๐ฉ๐จ๐ง๐๐ง๐ญ๐ฌ ๐ข๐ง๐ญ๐ซ๐จ๐๐ฎ๐๐ ๐ก๐ข๐ ๐ก-๐ซ๐ข๐ฌ๐ค ๐ฏ๐ฎ๐ฅ๐ง๐๐ซ๐๐๐ข๐ฅ๐ข๐ญ๐ข๐๐ฌ?
read article
Ultralytics AI Pwn Request Supply Chain Attack
read article
Advanced Software Composition Analysis: A Modern Guide to Open Source Security
read article
Understanding command injection vulnerabilities in Go
read article
The mysterious supply chain concern of string-width-cjs npm package
read article
If you donโt know about HTTP Archiveโs Web Almanac yet, you should!
read article
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant
read article
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System
read article
Abusing Ubuntu 24.04 features for root privilege escalation
read article
Vulnerabilities in NodeJS C/C++ add-on extensions
read article
Polyfill supply chain attack embeds malware in JavaScript CDN assets
read article
How to secure a REST API?
read article
Open Source Isn't Itself Insecure - but Your Supply Chain Could Be
read article
Preventing broken access control in express Node.js applications
read article
How to secure Python Flask applications
read article
How to install Java on macOS
read article
Symmetric vs. asymmetric encryption: Practical Python examples
read article
The ultimate guide to creating a secure Python package
read article
Building an npm package compatible with ESM and CJS in 2024
read article
Exploiting HTTP/2 CONTINUATION frames for DoS attacks
read article
GitHub โbesiegedโ by malware repositories and repo confusion: Why you'll be ok
read article
Creating SBOMs with the Snyk CLI
read article
Preventing server-side request forgery in Node.js applications
read article
10 GitHub Security Best Practices
read article
7 tips to become a successful bug bounty hunter
read article
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195)
read article
Handling security vulnerabilities in Spring Boot
read article
Dependency injection in Python
read article
The art of conditional rendering: Tips and tricks for React and Next.js developers
read article
Featured ones: