🎄 Join our Annual Holiday wargame and win prizes!


Implementing Secure By Patching, Secure By Design and Secure By Default

26/06/2024

Addressing security vulnerabilities can be approached in various ways, each with its own strengths and initial time investment. In my latest video, I tackle a basic security vulnerability: reflected XSS. First, I demonstrate how to exploit it, and then I show three approaches to fix it: secure by patching (spot patching), secure by design, and secure by default.

It’s worth noting that “secure by design” and “secure by default” don’t have rigid definitions and are used in various security contexts. My goal here is to highlight the differences between these methods in the realm of secure coding.

Try out the same exercise I used in the video here: XSS.py.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more