hacking, bug bounty, appsec

Leveraging LLMs for Threat Modeling - GPT-3.5


In this article, I delve into the AI Nutrition-Pro experiment, a research project exploring the potential of LLMs in enhancing security practices during the design phase of DevSecOps: threat modeling and security review.
Read more ⟶

Mitigating SSRF vulnerabilities in Go. A practical guide. Part 2


In this final part of mitigation guide we will explore doyensec/safeurl library for Go.
Read more ⟶

Security Coding in Go. Input validation


Input validation is one of most important technique in secure coding. Deep dive into it for Go language.
Read more ⟶

Mitigating SSRF vulnerabilities in Go. A practical guide. Part 1


Server-Side Request Forgery (SSRF) vulnerabilities have been around for a long time, and they still pose a significant threat to web applications, so much so this kind of vulnerability has been included in OWASP TOP 10. This time I will explain how to mitigate SSRF vulnerability in Go applications.
Read more ⟶