“security” Archive
Subtopics: authentication, authorization, cors, cryptography, csp, vulnerabilities (non-exhaustive) · glossary look-up: “security”
Featured on Frontend Dogma? Confirm and whitelist your domain.
- Developer Guide: How to Implement Passkeys (via) · · guides, how-tos, authentication, passkeys
- Avoid Hotlinking Images With “Cross-Origin-Resource-Policy” · · images
- Content Security Policy Level 3 (by/via) · · standards, csp
- Security (by+/via) · · web-almanac, studies, research, metrics
- JavaScript Import Attributes (ES2025) (by) · · javascript
- Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 US Election (by+/via) · · traffic
- Securing Your Express REST API With Passport.js (by/via) · · nodejs, express, json-web-tokens, apis, tooling
- SecretLint—a Linter for Preventing Committing Credentials (by) · · tooling, linting
- The Importance of UX in Cybersecurity (by/via) · · user-experience, usability
- Top 4 Web Vulnerabilities With Example and Mitigation (by/via) · · vulnerabilities, sql, databases
- Understanding “npm audit” and Fixing Vulnerabilities (by) · · npm, vulnerabilities, nodejs
- How to Implement Content Security Policy (CSP) Headers for Astro (by) · · how-tos, http, http-headers, csp, astro, vercel, cloudflare
- Why Code Security Matters—Even in Hardened Environments (via) · · vulnerabilities, file-handling, nodejs
- Database 101: SSL/TLS for Beginners (by/via) · · introductions, databases, ssl, tls, authentication
- Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (by) · · studies, research, engineering-management
- NIST Recommends Some Common-Sense Password Rules (by) · · passwords, guidelines
- I Finally Understand OAuth · · authorization, oauth, processes
- Fake GitHub Site Targeting Developers (by/via) · · github
- Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (by) · · javascript
- Gaining Access to Anyone’s Browser Without Them Even Visiting a Website (by) · · arc, browsers, vulnerabilities
- 5 Wasm Use Cases for Frontend Development (by/via) · · guest-posts, webassembly, performance
- Migrating From Netlify to Cloudflare for AI Bot Protection (by) · · migrating, netlify, cloudflare, ai
- The Great npm Garbage Patch (via) · · dependencies, npm, spam
- Frontend Security Checklist (by) · · checklists, react
- Automated Ways to Security Audit Your Website · · auditing, automation, tooling
- Secure Node.js Applications From Supply Chain Attacks (by/via) · · nodejs, best-practices, dependencies
- The Pitfalls of In-App Browsers (via) · · browsers, mobile, privacy, user-experience
- The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) (by) · · google, gcp
- Supply Chain Security in npm—We Can Be Optimistic About the Future (by/via) · · npm, dependencies, provenance
- Script Integrity (by/via) · · embed-code, javascript
- Introducing the MDN HTTP Observatory (by/via) · · introductions, mozilla, http
- WebAuthn: Enhancing Security With Minimal Effort (by/via) · · authentication
- Tuesday, July 2, 2024 Security Releases (via) · · release-notes, nodejs
- RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (by/via) · · ssh, vulnerabilities
- Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (by/via) · · vulnerabilities
- Catching Compromised Cookies (by/via) · · cookies, testing
- Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (by/via) · · wordpress, plugins
- The Hacking of Culture and the Creation of Socio-Technical Debt (by) · · culture
- OAuth Authentication (by/via) · · authentication, authorization, oauth
- What Is Mixed Content? (by) · · http
- Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (by/via) · · npm, dependencies, vulnerabilities, caching
- How a Single Vulnerability Can Bring Down the JavaScript Ecosystem (by) · · javascript, npm, dependencies, caching, vulnerabilities
- JavaScript Security: Simple Practices to Secure Your Frontend (by/via) · · javascript, dependencies, csp
- Manifesto for a Humane Web (by) · · websites, manifestos, web, principles, accessibility, dei, sustainability, user-experience
- Securing Client-Side JavaScript (by) · · javascript, graceful-degradation
- Poor Express Authentication Patterns in Node.js and How to Avoid Them (by) · · express, nodejs, authentication
- Passkeys: A Shattered Dream (by) · · authentication, passkeys
- Using Legitimate GitHub URLs for Malware (by) · · github
- When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (by) · · accessibility
- Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (by+/via) · · foss
- Wednesday, April 10, 2024 Security Releases (by/via) · · release-notes, nodejs
- Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities (by) · · books, nodejs, vulnerabilities
- The Free Software Commons (by) · · foss, community
- The V8 Sandbox (by/via) · · v8
- Wednesday, April 3, 2024 Security Releases (via) · · release-notes, nodejs
- Using JSON Web Tokens With Node.js (by/via) · · json-web-tokens, nodejs, authentication
- Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? (via) · · dns
- In-App Browsers Are Still a Privacy, Security, and Choice Problem (by/via) · · browsers, mobile, privacy
- How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (by/via) · · npm, dependencies, examples
- Preventing SQL Injection Attacks in Node.js (via) · · nodejs, databases, sql
- Wednesday, February 14, 2024 Security Releases (by+/via) · · release-notes, nodejs
- How to Boost WordPress Security and Protect Your SEO Ranking (via) · · how-tos, wordpress, seo
- Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (by/via) · · npm, dependencies
- Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (by/via) · · html, dom, shadow-dom, apis
- Tuesday, February 6, 2024 Security Releases (by/via) · · release-notes, nodejs
- JWT vs. Session Authentication (by/via) · · authentication, json-web-tokens, comparisons
- GitHub, npm Registry Abused to Host SSH Key-Stealing Malware (via) · · github, npm, foss
- Deceptive Deprecation: The Truth About npm Deprecated Packages (by+/via) · · npm, dependencies, research
- Safely Accessing the DOM With Angular SSR (by/via) · · dom, javascript, angular, server-side-rendering
- Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (via) · · nodejs
- I Hate CORS (by) · · videos, cors
- Building Multiple Progressive Web Apps on the Same Domain (by/via) · · videos, web-apps, progressive-web-apps, architecture
- Session-Based vs. Token-Based Authentication: Which Is Better? (by) · · authentication, json-web-tokens, comparisons
- 10 Best Practices for Secure Code Review of Node.js Code (by) · · best-practices, code-reviews, nodejs
- Security Headers Using “<meta>” (by/via) · · csp, html
- Blind CSS Exfiltration: Exfiltrate Unknown Web Pages (by/via) · · css
- Mastering Cryptography Fundamentals With Node’s “crypto” Module (by) · · cryptography, nodejs
- Secure Code Review Tips to Defend Against Vulnerable Node.js Code (by) · · nodejs, code-reviews
- Understanding CORS (by) · · cors
- Secret Scanning Scans Public npm Packages (via) · · github, npm, dependencies
- What the !#@% Is a Passkey? (by/via) · · passkeys
- Local HTTPS for Next.js 13.5 (by) · · testing, http, nextjs
- Understanding XSS Attacks (by/via) ·
- A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (by/via) · · guides, javascript, regex
- SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (by/via) · · ssh, dependencies, npm
- Best Practices for Securing Node.js Applications in Production (by+/via) · · best-practices, nodejs
- npm Provenance General Availability (via) · · github, npm, provenance
- The WebP 0-Day (by) · · webp, google, apple
- Open Source Trends to Look for in 2024 (via) · · foss, trends, visions, ai
- Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples (by) · · nodejs, history, examples
- How to Implement SSL/TLS Pinning in Node.js (via) · · how-tos, ssl, tls, nodejs
- A More Intelligent and Secure Web (by/via) · · videos, w3c, standards, web, web-platform
- Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works · · cors, javascript
- Towards HTTPS by Default (by/via) · · browsers, google, chrome, http, tls
- Sophisticated, Highly-Targeted Attacks Continue to Plague npm (via) · · npm
- An Update on Chrome Security Updates—Shipping Security Fixes to You Faster (via) · · browsers, google, chrome
- Tuesday, August 8, 2023 Security Releases (by/via) · · release-notes, nodejs
- Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (via) · · github, npm, provenance, foss
- Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (via) · · npm
- Securing the Web Forward: Addressing Developer Concerns in Web Security (by/via) · · web, surveys
- User Input Sanitization and Validation: Securing Your App (by) · · sanitization, validation, conformance
- Encoding: A Brief History and Its Role in Cybersecurity (by/via) · · encoding, unicode, history
- Node.js Security Progress Report—17 Reports Closed (via) · · nodejs
- The Importance of Verifying Webhook Signatures (via) · · webhooks
- The Massive Bug at the Heart of the npm Ecosystem (by/via) · · npm, dependencies
- Understanding Authorization Before Authentication: Enhancing Web API Security (by/via) · · authorization, authentication, apis, comparisons
- An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript (by) · · introductions, vulnerabilities, nodejs, javascript
- All You Need to Know About CORS and CORS Errors (by/via) · · cors, errors
- Django: A Security Improvement Coming to “format_html()” (by) · · django, html
- Tuesday, June 20, 2023 Security Releases (by/via) · · release-notes, nodejs
- security.txt Now Mandatory for Dutch Government Websites · · legal
- File Upload Security and Malware Protection (by) · · file-handling, edge-computing
- Security Implications of HTTP Response Headers (via) · · http, http-headers
- Introducing npm Package Provenance (by+/via) · · introductions, github, npm, provenance, foss
- Generating Provenance Statements (by/via) · · npm, provenance
- 8 Best Tools for Cryptography and Encryption (via) · · link-lists, tooling, comparisons, cryptography, privacy
- Dissecting npm Malware: Five Packages and Their Evil Install Scripts (by/via) · · npm
- Passkeys: What the Heck and Why? (by/via) · · passkeys
- Cryptographically Protecting Your SPA (by) · · single-page-apps, cryptography
- Without Accessibility, There Is No Privacy or Security (via) · · accessibility, privacy
- How to Password-Protect a Static HTML Page With No JS (by) · · how-tos, css, fonts
- Quick Tip: How to Hash a Password in PHP (by/via) · · how-tos, php, passwords, tips-and-tricks
- Sandboxing JavaScript Code (by) · · javascript
- Unlocking Security Updates for Transitive Dependencies With npm (by/via) · · npm, dependencies, maintenance
- Conditional API Responses for JavaScript vs. HTML Forms (by) · · javascript, html, forms, comparisons
- Why Do We Need Authorization and Authentication? · · authorization, authentication
- The Top 10 Security Vulnerabilities for Web Applications (by/via) · · vulnerabilities, web-apps
- Leaked a Secret? Check Your GitHub Alerts… for Free (via) · · github
- DOM Clobbering (by/via) · · dom
- New npm Features for Secure Publishing and Safe Consumption (by/via) · · npm, dependencies
- Using SRI to Protect From Malicious JavaScript (by/via) · · javascript
- WordPress Versions 3.7–4.0 No Longer Get Security Updates (by/via) · · wordpress
- “Not Secure” Warning for IE Mode (by) · · browsers, microsoft, edge, internet-explorer
- Node.js Security Best Practices (via) · · nodejs, best-practices
- npm Security: Preventing Supply Chain Attacks (by/via) · · npm, dependencies
- Secure JavaScript URL Validation (by/via) · · javascript, validation, urls
- Create a Passkey for Passwordless Logins (by/via) · · authentication, passkeys
- Designing a Secure API (by/via) · · software-design, apis
- Phylum Detects Active Typosquatting Campaign Targeting npm Developers (via) · · npm, dependencies
- Security (by+/via) · · web-almanac, studies, research, metrics
- Continue Using .env Files as Usual (by) · · environments
- Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (by) · · html, forms
- Stop Using .env Files Now (by) · · environments
- Debunking Myths About HTTPS · · http, myths
- Secure Your Node.js App With JSON Web Tokens (by/via) · · nodejs, json-web-tokens
- Dependabot Unlocks Transitive Dependencies for npm Projects (via) · · dependencies, npm
- JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically (by/via) · · studies, research, nodejs, javascript, dependencies, quality
- Introducing Even More Security Enhancements to npm (by+/via) · · introductions, npm
- Top 5 npm Vulnerability Scanners (via) · · npm, vulnerabilities, tooling
- What Is Passwordless Authentication and How to Implement It (by/via) · · authentication, passwords
- GA4 Is Being Blocked by Content Security Policy (by) · · csp, metrics, google
- Please Remove That .git Folder · · git
- Should I Have Separate GitHub Accounts for Personal and Professional Projects? (via) · · discussions, github, career
- Understanding CSRF Attacks (by) ·
- npm Security Update: Attack Campaign Using Stolen OAuth Tokens (by/via) · · oauth, version-control, npm, github
- Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (by/via) · · javascript, npm, dependencies
- Unexpectedly HTTPS? (by) · · http
- How to Respond to Growing Supply Chain Security Risks? (by) · · how-tos, dependencies, nodejs, npm
- The Web Is for Everyone: Our Vision for the Evolution of the Web (by+/via) · · web, visions, privacy, accessibility, performance, user-experience
- Using HTTPS in Your Development Environment (by/via) · · http, environments
- How to Prevent SQL Injection Attacks in Node.js (by/via) · · how-tos, nodejs, databases, sql
- How to Fix Your Security Vulnerabilities With npm Override (via) · · how-tos, vulnerabilities, npm, dependencies
- Can You Get Pwned With CSS? (by) · · css
- Never, Ever, Ever Use Pixelation for Redacting Text (by/via) · · content, images, obfuscation
- Accessibly Insecure (by/via) · · accessibility
- Lessons Learned From Publishing a Content Security Policy (via) · · lessons, csp
- CSS Fingerprinting (by) · · websites, css, privacy
- Ain’t No Party Like a Third Party (by/via) · · dependencies, embed-code
- Security (by+/via) · · web-almanac, studies, research, metrics
- GitHub’s Commitment to npm Ecosystem Security (by/via) · · github, npm
- Understanding and Implementing OAuth2 in Node.js (by/via) · · nodejs, authorization, oauth
- How to Win at CORS (by) · · how-tos, cors, html, http
- The Options for Password-Revealing Inputs (by/via) · · html, css, passwords, usability
- npm Security Best Practices (by/via) · · npm, best-practices
- Encoding Data for POST Requests (by) · · javascript, encoding
- NPM Global Audit · · packages, npm, quality, auditing
- Understanding and Preventing Common Security Vulnerabilities (via) · · vulnerabilities
- Open Source Insights (via) · · websites, foss, dependencies, licensing
- TLS and mTLS Demystified · · tls, protocols
- Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of (via) · · edge-computing
- Best Practices for Inclusive Textual Websites (by) · · performance, accessibility, best-practices
- What Is mTLS and How Does It Work? (by) ·
- Mutual TLS: Stuff You Should Know (by/via) · · tls, protocols
- Don’t Try to Sanitize Input—Escape Output (by) · · sanitization, escaping
- How to Automatically Update Your JavaScript Dependencies (by/via) · · how-tos, javascript, dependencies, automation, processes
- Usability and Security; Better Together (via) · · usability, user-experience
- Understanding Subresource Integrity (by/via) · · embed-code
- Guide to Web Authentication (by) · · websites, authentication, javascript
- It’s Beginning to Look a Lot Like XSSmas (by/via) · · vulnerabilities
- Protecting Your Site With Feature Policy (by/via) · · http-headers, http
- AWS Security Guide: 7 Best Practices to Avoid Security Risks (via) · · guides, aws, best-practices
- WordPress Security as a Process (by/via) · · wordpress, processes
- Making Your Website Faster and Safer With Cloudflare (by/via) · · performance, caching, cloudflare
- Creating Secure Password Resets With JSON Web Tokens (by/via) · · passwords, json-web-tokens, nodejs
- The Complete Guide to Switching From HTTP to HTTPS (via) · · guides, http
- How (Not) to Control Your CDN (by) · · content-delivery, caching, http
- How to Secure WordPress With SSL (by/via) · · how-tos, wordpress, ssl
- How to Secure Your Web App With HTTP Headers (by/via) · · how-tos, web-apps, http, http-headers, csp
- Using SSH Securely (by) · · ssh
- Content Security Policy Level 2 (by+/via) · · standards, csp
- Content Security Policy, Your Future Best Friend (by/via) · · csp, link-lists
- A Refined Content Security Policy (via) · · html, csp, webkit, safari, apple, browsers
- Web Platform Security Boundaries (by) · · web-platform
- Distribution Packages Considered Insecure · · dependencies, unix-like
- Eliminating Known Vulnerabilities With Snyk (by/via) · · vulnerabilities, tooling
- 10 Web Predictions for 2016 (by/via) · · web, visions, site-generators, browsers, css, mobile, performance, webassembly, seo
- An in-Depth Look at CORS (by/via) · · cors, javascript, php
- Why Passwordless Authentication Works (by/via) · · authentication, passwords
- A Simple Developer Error Is Exposing Private Information on Thousands of Websites (by/via) · · version-control, git, mistakes, vulnerabilities
- More Tips to Further Secure WordPress (by/via) · · wordpress, tips-and-tricks, plugins
- Improving Web Security With the Content Security Policy (by/via) · · csp, http
- What Are the Security Risks of HTML5 Apps? (by/via) · · web-apps, sanitization
- Same-Origin Policy (by) · · cors, web-platform
- We Should All Have Something to Hide (by) · · privacy
- Mobile Website Security (by/via) · · mobile, hosting, policies
- WordPress Security Tips (by/via) · · wordpress, tips-and-tricks
- Bulletproof Your Drupal Website (via) · · drupal
- Top 10 PHP Security Vulnerabilities (via) · · php, vulnerabilities
- A Front End Engineer’s Manifesto (by) · · websites, manifestos, user-experience, progressive-enhancement, simplicity, foss, accessibility, community, learning
- A JavaScript Security Flaw (by) · · javascript
- The Secure Programmer’s Pledge · · manifestos
- An Introduction to Content Security Policy (by/via) · · introductions, csp
- Cross-Site Scripting Attacks (XSS) (by/via) · · examples
- How to Secure Your WordPress Website (by/via) · · how-tos, wordpress, link-lists
- Using CORS (by/via) · · cors
- Web Cryptography: Salted Hash and Other Tasty Dishes (by/via) · · cryptography
- 10 Useful WordPress Security Tweaks (by/via) · · wordpress
- Web Security: Are You Part of the Problem? (by/via) · · vulnerabilities, php, javascript
- JavaScript Security Experiments (by) · · javascript, experiments
- DOM vs. Web (by) · · http, dom
- Top 7 PHP Security Blunders (via) · · php, databases, sql
- Validate Your Input! (via) · · validation
- JavaScript Security · · javascript
- File Upload Security (by) · · html, file-handling
- Spot the Security Hole (by/via) · · php
- JavaScript and Security (by/via) · · javascript
- Handling Content From Strangers (by/via) · · content
- Getting Started With XML Security (by/via) · · introductions, xml
- Site and Origin Comparer (via) · tools, analysis, comparisons
- Malware and Security Scanner (via) · tools, analysis
- Email Blacklist Checker (via) · tools, analysis, email
- Domain or IP Spam Checker (via) · tools, analysis, domains
- DNSSEC Checker (via) · tools, analysis, dns
- Cross-Site WebSocket Hijacking Tester (by) · tools, analysis
- Cookie Use Checker (via) · tools, analysis, cookies
- Content Security Policy Validator (Google) (via) · tools, analysis, csp, conformance
- Content Security Policy Validator (CSP Validator) (by) · tools, analysis, csp, conformance
- Abuse Contact Lookup (via) · tools, analysis, policies
- Server Port Scanner (via) · tools, analysis, network, servers
- Website Experience Analyzer · tools, analysis, performance, user-experience