16/05/2024 OWASP Top 10 Secure Coding Challenges for Python Please find below a sample list of secure coding challenges for Python and their alignment with OWASP Top 10. The...
13/04/2024 Five Prompt Injection Tactics to Hack LLM Apps This is excerpt from our experiment titled: Lessons Learned from a Public Experiment: Securing and Attacking LLM-Based Apps The following...
13/04/2024 Eight Defensive Techniques to Secure LLM Apps Against Prompt Injection This is excerpt from our experiment titled: Lessons Learned from a Public Experiment: Securing and Attacking LLM-Based Apps The following...
02/12/2023 UUID Weakness - Why UUID Can Be Unsafe In my article on Technical analysis of Optus API security challenge - Three must to have API security controls I...
20/09/2023 Input Validation: Necessary but Not Sufficient; It Doesn't Target the Fundamental Issue I have reviewed several solutions for our fix the flag contests, contributed by seasoned developers and prominent CTF players. What...
22/08/2023 Stream Buffer Read: A Defensive Design Pattern for Content Size Validation Tl;dr: Apps rely on untrusted parameter to perform size check. This can result into DoS attack. Stream Buffer Read is...
25/05/2023 Evaluating ChatGPT Effectiveness in Passing A Secure Programming Challenge TL;DR: ChatGPT serves as a valuable tool by providing immediate information without the need for manual searches. It seems to...
01/12/2022 Write up for Start Here.js: How To and Not To Prevent Integer Overflow in JavaScript Tl;dr : This article is analysis of over 50 submissions for a JavaScript integer overflow challenge. Many submissions did not...
15/11/2022 Write up for Start Here.java Challenge Tl;dr : The input was not checked for out of range values. By enforcing size change on the data type,...