Secure Coding in Go: Avoiding Common Vulnerabilities - Benji Vesterby

preview_player
Показать описание
Secure coding practices are not intuitive for most engineers. This talk will cover the most common security missteps in developing secure code with Go. Leaning heavily on common application vulnerabilities (OWASP Top 10) and how they apply to Go, this tutorial session will guide attendees on how to avoid common security pitfalls.
Рекомендации по теме
Комментарии
Автор

This was such a good presentation.. It was such a good refresher (kudos for all the examples)..

_sudipidus_
Автор

Great insights and cautions that every engineer should heed, whether or not working in the Go ecosystem. The demos really drive home how easily an overlooked vulnerability could be exploited.

nathanthestout
Автор

Great presentation. Informative, engaging, and really interesting. I'm pretty new to go, but was still able to follow along. Thanks.

austincole
Автор

An insightful presentation my good friend. Hope to see more of these in the future.

OniBoto
Автор

Good points, especially about testing 3rd-party libraries. People often do all of this security analysis, but they're one rogue dependency away from total compromise. I always thought an in-house repository and in-house people responsible for signing off on dependencies would probably be the ideal, but only Google scale companies can afford to do that.

edhalferty