Application Security for Developers

Write code that
defends itself

Deep-dive guides on SQL injection, JWT attacks, supply chain security, and more. Real code examples. No fluff.

Filter by language: pythonnodejavago

Recent Articles

See all →
Vulnerability OWASP A01

CSRF Prevention — Tokens, SameSite Cookies, and the Patterns That Actually Work

Cross-Site Request Forgery remains a top web vulnerability despite years of awareness. This guide covers the attack mechanics, why naive defences fail, and the complete modern prevention stack including CSRF tokens, SameSite cookies, and custom request headers.

Vulnerability OWASP A03

SQL Injection Prevention: A Complete Developer Guide

Parameterised queries, ORM pitfalls, and blind SQLi detection patterns to protect your application data.

Guide

Secrets Management: The Twelve-Factor Approach and Beyond

How secrets end up in git history, why environment variables aren't enough, and how to use Vault and AWS Secrets Manager properly.

Vulnerability OWASP A02

JWT Security: Common Mistakes That Lead to Authentication Bypass

The alg:none attack, weak secrets, JWKS spoofing, and how to validate JWTs correctly in Node and Python.

Vulnerability

Dependency Confusion and Supply Chain Attacks: Protecting Your Build Pipeline

How dependency confusion attacks work against npm and pip, and how to configure private registries to block them.

Vulnerability OWASP A08

Insecure Deserialization: Java Gadget Chains, Python Pickle, and Safe Alternatives

How insecure deserialization leads to remote code execution in Java and Python, and the safe alternatives for each.

Stay current on AppSec

Subscribe via RSS for new guides on vulnerabilities, tools, and secure coding practices.

Subscribe via RSS