Questions tagged [secure-coding]
The secure-coding tag has no usage guidance.
16
questions
1
vote
1answer
74 views
Best practice to avoid unintentional side-effects in powershell-scripts
I recently wrote a small PowerShell script to clean a Visual Studio solution. It's used by a small team of 5 persons on a regular basis. I built it in PowershellISE (GUI client) and it works great, ...
0
votes
0answers
32 views
What is the best way to easily tamper with request data for purposes of vulnerability testing on a web site?
When developing web pages, it's often critical to test and verify that the application is protected against various forms of bad input, even if the front end offers some discouragement against the bad ...
-2
votes
4answers
158 views
Prevent users cheating a view count
I wrote a small video library app. It renders private Vimeo videos for paid subscribers.
The owners of the app would like to reward users who watch videos. My first implementation was to trigger a ...
4
votes
1answer
1k views
Are there widely-accepted guidelines to write safe C? How do people learn that? [closed]
C often seems to be taught in terms of contracted examples without much regard to code safety, such as buffer overflows etc. I have often wondered if there are proven, totally safe ways of writing C ...
0
votes
1answer
719 views
Is it possible to secure both web page and web API access with a JWT?
I am trying to wrap my head around having a secure WEB API and at the same time securing the client that accesses the WEB API. I am hoping someone can point me in the right direction.
Here is my ...
3
votes
3answers
1k views
Is checking return values always required? [duplicate]
We know that checking return values prevent our software from unexpected states. (You can see CWE definition.)
But, we are sometimes sure about the return value. For example:
bool ...
0
votes
1answer
93 views
Sending Out Functions To Return Or To Die
Which is preferable for both solid technique and secure coding?
Example #1:
function_one()
blah;
function_two()
blah;
print blah;
exit;
...
Example #2:
...
13
votes
0answers
737 views
Is there a reasonable way for a TypeScript class to derive from a Dojo/Dijit class?
DefinitelyTyped has a Dojo solution which uses named modules and may work with legacy Dojo and explicit typing. But these declarations do not facilitate TypeScript import, since there are no anonymous ...
2
votes
1answer
129 views
Security Pattern to store SSH Keys
I am writing a simple flask application to submit scientific tasks to remote HPC resources. My application in background talks to remote machines via SSH (because it is widely available on various HPC ...
1
vote
1answer
82 views
What kind of processes or static alaysis would you use to catch impropper buffer bugs such as the one that caused heartbleed? [closed]
What kind of process or static analysis would catch the heart bleed bug other than human code reviews which we already know failed. The Fix Commit is here.
0
votes
1answer
1k views
Is sending data to a server via a script tag an outdated paradigm?
I inherited some old javascript code for a website tracker that submits data to the server using a script url:
var src = "http://domain.zzz/log/method?value1=x&value2=x"
var e = document....
6
votes
3answers
1k views
Login on every page requires SSL on all pages
Our website has a login form that shows up in the header on every page on the website. This is what my boss wants however we need to get PCI compliant and it says any sensitive form (login/password) ...
3
votes
1answer
214 views
What procedures or audits should be used to assess the security of a software system?
Are there any standardised security procedures or auditing techniques that can be used to assess the security of a piece of software? I'm specifically interested in auditing software written in Java, ...
5
votes
2answers
475 views
Web application development security best practices [closed]
I am looking for the current, state of the art, coding standards for web development (mostly PHP). Since I do not want to reinvent the wheel I would like to reuse libraries written by people much ...
5
votes
4answers
249 views
Are there languages that make it easier to understand secure coding principles?
I'm interested in expanding my knowledge of security issues: things like buffer overflows, format string vulnerabilities, etc. I'd like to be able to go through a language and understand its security ...
5
votes
3answers
323 views
Examining source code for maliciousness and security vulnerabilities
What are some techniques in determining if a particular piece of source code is malicious or vulnerable to malicious attack? I am currently using cppcheck and I am waiting on an install of Rational ...