Editors' Pick

Trending Posts

Popular Post

Recent Posts

post-thumb

Web3 Unveiled: How Decentralization is shaping the future of the Internet

This article aims to introduce the concept of Web3, sometimes presented as the next evolution of the Internet. We will review the ins and outs of this concept, exploring its implications and how it could reshape our interaction with the digital world. In doing so, we will try to give a glimpse of what the future of the Internet could be.

Read more Details
post-thumb

Diagram As Code

Diagram as Code (DaC) is a methodology that allows you to create and maintain software architecture diagrams using code. With DaC, you can define the structure of your application in a declarative way, using a domain-specific language (DSL) or a programming language, and generate diagrams from that code automatically. This approach has many benefits over manual diagramming, such as improved consistency, better maintainability, and increased automation.

Read more Details
post-thumb

Invisible code and XSS attacks

Trojan: Attacks from the inside

XSS attacks were quite common at the time of the early web. They were used to steal cookies, to redirect users to malicious websites, to inject malicious code in the page, etc. Websites were more vulnerable to XSS at that time because they used a lot server-side templating with technologies like PHP or JSP, with very few built-in protections for injecting JavaScript code into HTML responses. Today, we are much more careful about escaping user inputs and evaluating HTML dynamically. We use frameworks like React or Vue.js to build our web applications, which are based on declarative templating that escape all HTML by default and encourage sending serialized data instead of HTML on the wire. Dynamic code evaluation is considered a bad practice and injection patterns are catched by code analysis tools like ESLint or SonarQube. XSS attacks have therefore to find more creative ways to inject malicious code into the page. If they can’t inject from the outside, they will try to inject from the inside, targeting the code of the application itself. They can do that directly through project dependencies or pull requests to open source projects, or indirectly through StackOverflow answers, blog posts, AI chatbots, etc.

Read more Details