Frontend Dogma

“security” Archive

Supertopics: · subtopics: , , , , , , , , , , , , , , , , ,  (non-exhaustive) · glossary look-up: “security”

Entry (Sources) and Other Related TopicsDate#
MCP Security Vulnerabilities and Attack Vectors390
,
A New Era of Code Quality389
The Growing Risk of Malicious Browser Extensions (soc)388
Design Patterns for Securing LLM Agents Against Prompt Injections (sim)387
, , , ,
HTML Spec Change: Escaping “<” and “>” in Attributes (sec/dev)386
, , ,
Escaping “<” and “>” in Attributes—How It Helps Protect Against Mutation XSS (sec)385
, , , , , ,
Beware of End-of-Life Node.js Versions—Upgrade or Seek Post-EOL Support (mco/nod)384
,
How to Access Local MCP Servers Through a Secure Tunnel (the)383
, , , ,
Docker Launches Hardened Images, Intensifying Secure Container Market (the)382
Securing Your Node.js App From Command Injection381
Passkeys for Normal People (tro)380
, , ,
npm Targeted by Malware Campaign Mimicking Familiar Library Names (soc)379
, , ,
Threat Actors Misuse Node.js to Deliver Malware and Other Malicious Payloads (mic)378
,
Principles for Coding Securely With LLMs377
,
TLS Certificate Lifetimes Will Officially Reduce to 47 Days376
LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho/the)375
,
Secure a Vue App With OpenID Connect and the BFF Pattern (due)374
, ,
Teaching Code in the AI Era: Why Fundamentals Still Matter (ali)373
, , , , , , , ,
Stop Using Jenkins in 2025 (oso)372
, ,
Node.js Test CI Security Incident (nod)371
,
Website Hijack Campaign Now Impacting 150,000 Sites (gad)370
Malware Found on npm Infecting Local Package With Reverse Shell (rev)369
,
Five Things Vibe Coders Should Know (From a Software Engineer) (uxd)368
,
GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf)367
,
How to Prevent WordPress SQL Injection Attacks (sma)366
, , ,
Lazarus Strikes npm Again With New Wave of Malicious Packages (soc)365
,
What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet)364
, , ,
Updates on CVE for End-of-Life Versions (raf/nod)363
How to Protect Your Web Applications From XSS (tor/w3c)362
, ,
Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm)361
,
The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq)360
,
It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber)359
, ,
How OWASP Helps You Secure Your Full-Stack Web Applications (eri/sma)358
, , , , , , ,
10 Common Web Development Mistakes to Avoid Right Now357
, , , , , , ,
Tightening Every Bolt (bag)356
, , ,
On Generative AI Security (sch)355
, ,
Understanding CORS Errors in Signed Exchanges (paw)354
, ,
Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre)353
, ,
How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares352
, ,
Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar/soc)351
,
Tuesday, January 21, 2025 Security Releases (raf/nod)350
,
APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the)349
CDN-First Is No Longer a Performance Feature (osv)348
, , , ,
The Cyber-Cleanse: Take Back Your Digital Footprint (cyb)347
15 Principles for Secure Programming (rak)346
, ,
Important Topics for Frontend Developers to Master in 2025345
, , , , , , , , , ,
How to Automate OWASP Security Reviews in Your Pull Requests? (cod)344
, , , ,
Developer Guide: How to Implement Passkeys343
, , ,
5 Technical Trends to Help Web Developers Stand Out in 2025 (the)342
, , , ,
Avoid Hotlinking Images With “Cross-Origin-Resource-Policy”341
Content Security Policy Level 3 (mik/w3c)340
,
Security (htt)339
, , ,
JavaScript Import Attributes (ES2025) (tre)338
Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo)337
Securing Your Express REST API With Passport.js336
, , , , ,
SecretLint—a Linter for Preventing Committing Credentials (tre)335
,
Top 4 Web Vulnerabilities With Example and Mitigation334
, , , ,
The Importance of UX in Cybersecurity (uxm)333
,
Understanding “npm audit” and Fixing Vulnerabilities332
, ,
How to Implement Content Security Policy (CSP) Headers for Astro (tre)331
, , , , , ,
Why Code Security Matters—Even in Hardened Environments330
, ,
Database 101: SSL/TLS for Beginners329
, , , ,
Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre)328
, ,
NIST Recommends Some Common-Sense Password Rules (sch)327
,
I Finally Understand OAuth326
, ,
Fake GitHub Site Targeting Developers (jul/san)325
Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev)324
Gaining Access to Anyone’s Browser Without Them Even Visiting a Website323
, , ,
5 Wasm Use Cases for Frontend Development (des)322
, ,
Web Security: Shaping the Secure Web (set/w3c)321
,
What Is Incident Response?320
,
Migrating From Netlify to Cloudflare for AI Bot Protection (sia)319
, , ,
The Great npm Garbage Patch318
, ,
Frontend Security Checklist (tre)317
,
Automated Ways to Security Audit Your Website316
, ,
Secure Node.js Applications From Supply Chain Attacks315
, ,
The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It)314
,
The Pitfalls of In-App Browsers (fro)313
, , ,
Supply Chain Security in npm—We Can Be Optimistic About the Future312
, ,
Script Integrity (chr/fro)311
,
WebAuthn: Enhancing Security With Minimal Effort (tbe)310
,
Introducing the MDN HTTP Observatory (mdn)309
, , ,
Tuesday, July 2, 2024 Security Releases (nod)308
,
RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server307
,
Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (sny)306
,
Catching Compromised Cookies305
,
Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan/ars)304
,
The Hacking of Culture and the Creation of Socio-Technical Debt (sch)303
OAuth Authentication (rya)302
, ,
What Is Mixed Content? (fre)301
Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar/soc)300
, , ,
The Ultimate Guide to Iframes (log)299
, , ,
How a Single Vulnerability Can Bring Down the JavaScript Ecosystem298
, , , ,
JavaScript Security: Simple Practices to Secure Your Frontend297
, ,
Manifesto for a Humane Web (mic)296
, , , , , , ,
Securing Client-Side JavaScript (ada)295
,
Poor Express Authentication Patterns in Node.js and How to Avoid Them294
, ,
Passkeys: A Shattered Dream (fir)293
,
Using Legitimate GitHub URLs for Malware (sch)292
,
When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? (nic)291
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope)290
Wednesday, April 10, 2024 Security Releases (raf/nod)289
,
Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities288
, ,
The Free Software Commons (jen)287
,
The V8 Sandbox286
Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks?285
Using JSON Web Tokens With Node.js284
, ,
Wednesday, April 3, 2024 Security Releases (nod)283
,
In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho/the)282
, ,
CORS Finally Explained—Simply281
, ,
How Does Single Sign-On (SSO) Work? (mil)280
How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package (eth)279
, ,
Preventing SQL Injection Attacks in Node.js (sny)278
, ,
Frontend Application Security: Tips and Tricks277
, , , , , , ,
Wednesday, February 14, 2024 Security Releases (raf+/nod)276
,
How to Boost WordPress Security and Protect Your SEO Ranking275
, ,
Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar/soc)274
,
Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar/van)273
, , ,
Tuesday, February 6, 2024 Security Releases (raf/nod)272
,
JWT vs. Session Authentication271
, ,
GitHub, npm Registry Abused to Host SSH Key-Stealing Malware270
, , ,
Deceptive Deprecation: The Truth About npm Deprecated Packages269
, ,
Safely Accessing the DOM With Angular SSR (dev)268
, , ,
Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope)267
I Hate CORS266
,
Building Multiple Progressive Web Apps on the Same Domain (dev)265
, , ,
Session-Based vs. Token-Based Authentication: Which Is Better?264
, ,
10 Best Practices for Secure Code Review of Node.js Code263
, ,
Security Headers Using “<meta>” (sap/mat)262
,
Blind CSS Exfiltration: Exfiltrate Unknown Web Pages261
Mastering Cryptography Fundamentals With Node’s “crypto” Module260
,
Secure Code Review Tips to Defend Against Vulnerable Node.js Code259
,
Understanding CORS258
What the !#@% Is a Passkey? (eff)257
Secret Scanning Scans Public npm Packages (git)256
, ,
Local HTTPS for Next.js 13.5 (ami)255
, ,
Understanding XSS Attacks (ver)254
A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi)253
, ,
SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble)252
, ,
Best Practices for Securing Node.js Applications in Production251
,
npm Provenance General Availability (git)250
, ,
Open Source Trends to Look for in 2024249
, , ,
The WebP 0-Day248
, ,
Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples247
, ,
How to Implement SSL/TLS Pinning in Node.js (sny)246
, , ,
A More Intelligent and Secure Web (ple/w3c)245
, , , ,
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works244
,
Towards HTTPS by Default (jde/dev)243
, , , ,
Sophisticated, Highly-Targeted Attacks Continue to Plague npm242
An Update on Chrome Security Updates—Shipping Security Fixes to You Faster241
, ,
Tuesday, August 8, 2023 Security Releases (raf/nod)240
,
Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git)239
, , ,
Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc)238
,
Securing the Web Forward: Addressing Developer Concerns in Web Security (tor/w3c)237
,
Encoding: A Brief History and Its Role in Cybersecurity236
, ,
User Input Sanitization and Validation: Securing Your App235
, ,
Node.js Security Progress Report—17 Reports Closed (ope)234
The Importance of Verifying Webhook Signatures (sny)233
The Massive Bug at the Heart of the npm Ecosystem232
,
An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript231
, , ,
Understanding Authorization Before Authentication: Enhancing Web API Security230
, , ,
All You Need to Know About CORS and CORS Errors229
,
Django: A Security Improvement Coming to “format_html()” (ada)228
,
Tuesday, June 20, 2023 Security Releases (raf/nod)227
,
security.txt Now Mandatory for Dutch Government Websites226
File Upload Security and Malware Protection (aus)225
, ,
Security Implications of HTTP Response Headers (sny)224
,
Generating Provenance Statements223
,
Introducing npm Package Provenance (git)222
, , , ,
8 Best Tools for Cryptography and Encryption (sta)221
, , , , ,
Dissecting npm Malware: Five Packages and Their Evil Install Scripts220
,
Passkeys: What the Heck and Why? (css)219
Senior Engineering Strategies for Advanced React and TypeScript (tec)218
, , , , , , ,
Cryptographically Protecting Your SPA217
,
Without Accessibility, There Is No Privacy or Security216
,
How to Password-Protect a Static HTML Page With No JS (ede)215
, ,
Quick Tip: How to Hash a Password in PHP214
, , ,
Sandboxing JavaScript Code213
Unlocking Security Updates for Transitive Dependencies With npm (git)212
, ,
7 Required Steps to Secure Your Iframes Security211
, , , ,
Conditional API Responses for JavaScript vs. HTML Forms (aus)210
, , ,
Why Do We Need Authorization and Authentication?209
,
The Top 10 Security Vulnerabilities for Web Applications208
,
Leaked a Secret? Check Your GitHub Alerts… for Free (git)207
DOM Clobbering (fre/mat)206
New npm Features for Secure Publishing and Safe Consumption (git)205
,
Using SRI to Protect From Malicious JavaScript (mat)204
WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar)203
“Not Secure” Warning for IE Mode202
, , ,
Node.js Security Best Practices (nod)201
,
npm Security: Preventing Supply Chain Attacks (sny)200
,
Secure JavaScript URL Validation (sny)199
, ,
Create a Passkey for Passwordless Logins (age/dev)198
,
Designing a Secure API197
,
Phylum Detects Active Typosquatting Campaign Targeting npm Developers196
,
Security (htt)195
, , ,
Continue Using .env Files as Usual194
Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod)193
,
Stop Using .env Files Now192
Debunking Myths About HTTPS191
,
Secure Your Node.js App With JSON Web Tokens (app)190
,
Dependabot Unlocks Transitive Dependencies for npm Projects (git)189
,
JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically188
, , , , ,
Introducing Even More Security Enhancements to npm (git)187
,
Top 5 npm Vulnerability Scanners186
, ,
What Is Passwordless Authentication and How to Implement It185
,
GA4 Is Being Blocked by Content Security Policy184
, ,
Please Remove That .git Folder183
Should I Have Separate GitHub Accounts for Personal and Professional Projects?182
, ,
Understanding CSRF Attacks (zel)181
npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git)180
, , ,
Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (sny)179
, ,
Unexpectedly HTTPS?178
How to Respond to Growing Supply Chain Security Risks?177
, , ,
The Web Is for Everyone: Our Vision for the Evolution of the Web (moz)176
, , , , ,
Using HTTPS in Your Development Environment175
,
How to Prevent SQL Injection Attacks in Node.js174
, , ,
How to Fix Your Security Vulnerabilities With npm Override173
, , ,
Can You Get Pwned With CSS?172
Never, Ever, Ever Use Pixelation for Redacting Text171
, ,
Accessibly Insecure170
Lessons Learned From Publishing a Content Security Policy169
,
Ain’t No Party Like a Third Party (ada/css)168
,
Security (htt)167
, , ,
GitHub’s Commitment to npm Ecosystem Security (git)166
,
Understanding and Implementing OAuth2 in Node.js (hon)165
, ,
How to Win at CORS (jaf)164
, , ,
The Options for Password-Revealing Inputs (chr/css)163
, , ,
npm Security Best Practices (owa)162
,
Encoding Data for POST Requests (jaf)161
,
NPM Global Audit160
, , ,
Understanding and Preventing Common Security Vulnerabilities159
Open Source Insights158
, , ,
I Learned to Love the Same-Origin Policy (eee/css)157
Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of156
TLS and mTLS Demystified155
,
Best Practices for Inclusive Textual Websites154
, ,
What Is mTLS and How Does It Work?153
Mutual TLS: Stuff You Should Know152
,
Don’t Try to Sanitize Input—Escape Output151
,
Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn)150
, , ,
How to Automatically Update Your JavaScript Dependencies (spa/clo)149
, , , ,
Usability and Security; Better Together (24w)148
,
Server-Side Includes (SSI) Injection (owa)147
Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip/tec)146
, ,
Security and Privacy for Our Times (luk/w3c)145
,
CSS Security Vulnerabilities (chr/css)144
, ,
Understanding Subresource Integrity (dre/sma)143
,
W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c)142
, ,
Guide to Web Authentication141
, , ,