CloudRaftcloudraft.hashnode.dev·Dec 23, 2024Secure Coding Best PracticesEvery single day, an extensive array of fresh software vulnerabilities is unearthed by diligent security researchers and analysts. A considerable portion of these vulnerabilities emerges due to the absence of secure coding practices. Exploiting such ...secure coding best practices
Aastha Saxenaaasthasaxena.hashnode.dev·Dec 22, 2024Why Every Developer Needs Code Reviews: Insights for Writing Better CodeImagine you’re working on a critical feature. You’ve written the code, tested it, and everything seems to work perfectly. But then a senior developer reviews your code and points out something small yet significant—a better way to handle an edge case...1 like·53 readscoding
Nikita Sarkanianikitasarkania.hashnode.dev·Oct 2, 2024Security Risks of Inline Event Handlers in React.js (And How to Avoid Them)If you’re a React.js developer, chances are you’ve dropped an inline event handler into your code without even thinking twice. It’s so easy to do! You might write something like this: <button onClick={() => alert('You clicked me!')}>Click Me</button>...84 readsReactSecurity
Sandeep Gokhalegokhale.hashnode.dev·Sep 16, 2024Secret keys in your code ? Worry no moreSecurity Breach Did you know, 82% of breaches involve a human element like social attacks, errors, or misuse, with many originating from developers by accidentally exposing sensitive information like passwords, keys or secrets. The average cost of a...28 readsDevSecOps
Josep johomo.hashnode.dev·Aug 7, 2024Choosing the Right Dependencies: Ensuring Quality and Security in your Software ProjectsBuilding a project from scratch is rare due to the complexity and time constraints involved. Instead, developers often build applications on top of existing software. This means our software depends on other software. Dependencies are necessary and u...27 readsDeveloper Career Growthopenssf scorecard
Pranav Bawgikarpranavbawg.hashnode.dev·Jul 2, 2024Robust programming to bomb-proof your code[15] Introduction Secure programming is a type of coding that focuses on preventing known vulnerabilities. However, robust programming takes it a step further. It emphasizes building well-structured programs that anticipate and handle the potential p...Robust Programming
Mohammad Imranimransaifi.hashnode.dev·Apr 4, 2024How to Sign Your Commits: A Guide for Git UsersWhy Sign Your Commits? Before learning how to sign commits, we will learn why signing your commits is important. Commit signing offers several benefits for both individual developers and collaborative projects: Code Integrity: Signing your commits v...11 likes·33 readsGitHub
Deep Nandredeepnandre.hashnode.dev·Mar 8, 2024Enhancing Developer-Driven Security with Snyk IntegrationIn the fast-paced world of software development, there's a delicate dance between the need for speed and the imperative of security. Historically, these two forces have often been at odds. Developers have long been caught in the crossfire, striving t...1 like·33 readsDeveloper Security Tools
Jyotiprakash Mishrablog.jyotiprakash.org·Dec 28, 2023Secure Coding in CWriting secure code in C is crucial to preventing common vulnerabilities such as buffer overflows, injection attacks, and more. Here are some ways to enhance the security of your C code: Input Validation: Ensure that all user inputs are validated an...C Programmingbounds checking
Ethan Mitchellcybershield.hashnode.dev·Oct 25, 2023Secure Coding Practices: Building Resilient Software from the Ground UpIn the digital age, software is the backbone of our technological infrastructure. From mobile apps and websites to critical enterprise applications, software plays a pivotal role in our daily lives. However, as software continues to proliferate, so d...secure coding