- 189
- 245 332
Snyk
United States
เข้าร่วมเมื่อ 19 ก.ย. 2016
Welcome to the official TH-cam channel of Snyk!
We're a developer-first security company empowering businesses to develop software with speed and security. We deliver solutions that align development and security teams, allowing them to tackle code security, open-source security, container security, and license compliance challenges effectively.
On this channel, we share insights into modern development practices and provide practical tutorials around DevSecOps, open source security, cloud-native application security, secure AI usage, and much more. Our aim is to help developers stay secure without sacrificing velocity.
Whether you're a seasoned developer or just getting started, our videos are designed to boost your understanding of security in a software-driven world.
Stay up-to-date with the latest trends and best practices in software security. Subscribe to our channel and click the notification bell to never miss any of our new videos.
We're a developer-first security company empowering businesses to develop software with speed and security. We deliver solutions that align development and security teams, allowing them to tackle code security, open-source security, container security, and license compliance challenges effectively.
On this channel, we share insights into modern development practices and provide practical tutorials around DevSecOps, open source security, cloud-native application security, secure AI usage, and much more. Our aim is to help developers stay secure without sacrificing velocity.
Whether you're a seasoned developer or just getting started, our videos are designed to boost your understanding of security in a software-driven world.
Stay up-to-date with the latest trends and best practices in software security. Subscribe to our channel and click the notification bell to never miss any of our new videos.
How to Secure a REST API
This video explores the best practices for securing REST APIs, essential tools for developers, and common security threats to watch out for.
Use Snyk for free to find and fix security issues in your applications today! snyk.co/ugLYn
✍️ Resources ✍️
- Snyk Blog Post: snyk.co/uhHum
⏲️ Chapters ⏲️
00:00 - Intro
00:12 - Authentication and Authorization
01:04 - How to set up HTTPS in a Project
01:20 - Input Validation and Sanitization
02:32 - Rate Limiting and Throttling
03:17 - Project Example Using CSP and CORS
03:53 - API Logging and Monitoring
04:09 - Using Secure Dependencies
04:42 - More Information
⚒️ About Snyk ⚒️
Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.
Learn more about Snyk: snyk.co/ugLYl
📱 Connect with Us 📱
🖥️ Website: snyk.co/ugLYl
🐦 X: snyksec
💼 LinkedIn: www.linkedin.com/company/snyk
💬 Discord: discord.gg/devsecops-community-918181751526948884
▶️ Subscribe: th-cam.com/users/SnykSec
🔥 We're hiring! Check our open roles: snyk.co/ugLYp
🔗 Hashtags 🔗
#DevSecOps #rest #api
Use Snyk for free to find and fix security issues in your applications today! snyk.co/ugLYn
✍️ Resources ✍️
- Snyk Blog Post: snyk.co/uhHum
⏲️ Chapters ⏲️
00:00 - Intro
00:12 - Authentication and Authorization
01:04 - How to set up HTTPS in a Project
01:20 - Input Validation and Sanitization
02:32 - Rate Limiting and Throttling
03:17 - Project Example Using CSP and CORS
03:53 - API Logging and Monitoring
04:09 - Using Secure Dependencies
04:42 - More Information
⚒️ About Snyk ⚒️
Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.
Learn more about Snyk: snyk.co/ugLYl
📱 Connect with Us 📱
🖥️ Website: snyk.co/ugLYl
🐦 X: snyksec
💼 LinkedIn: www.linkedin.com/company/snyk
💬 Discord: discord.gg/devsecops-community-918181751526948884
▶️ Subscribe: th-cam.com/users/SnykSec
🔥 We're hiring! Check our open roles: snyk.co/ugLYp
🔗 Hashtags 🔗
#DevSecOps #rest #api
มุมมอง: 621
วีดีโอ
Understanding CSRF and SSRF Attacks (Demo and Examples)
มุมมอง 68914 วันที่ผ่านมา
In this video, we examine two critical web security vulnerabilities: CSRF (Cross-Site Request Forgery) and SSRF (Server-Side Request Forgery). Learn about each attack, how it differs, and why it poses serious risks to web applications. Use Snyk for free to find and fix security issues in your applications today! snyk.co/ugLYn ✍️ Resources ✍️ - CSRF blog: snyk.co/csrf-blog - SSRF blog: snyk.co/s...
How Secure is this NEW AI Coding Tool? Bolt by Stackblitz
มุมมอง 1K21 วันที่ผ่านมา
How Secure is this NEW AI Coding Tool? Bolt by Stackblitz
Security Terms You Need to Know | XSS, CSRF, VPN, Malware, CVE
มุมมอง 473หลายเดือนก่อน
Security Terms You Need to Know | XSS, CSRF, VPN, Malware, CVE
Exploiting Vulnerabilities in Cursor AI Code
มุมมอง 392หลายเดือนก่อน
Exploiting Vulnerabilities in Cursor AI Code
How AI Impacts Reconnaissance and Bug Bounties
มุมมอง 4282 หลายเดือนก่อน
How AI Impacts Reconnaissance and Bug Bounties
More Ways GitHub Copilot Makes You Vulnerable
มุมมอง 9093 หลายเดือนก่อน
More Ways GitHub Copilot Makes You Vulnerable
4 Hidden AI Coding Risks and How to Address Them
มุมมอง 7433 หลายเดือนก่อน
4 Hidden AI Coding Risks and How to Address Them
The Ultimate Guide to Choose the Best Open Source Packages
มุมมอง 3114 หลายเดือนก่อน
The Ultimate Guide to Choose the Best Open Source Packages
Uncovering the Polyfill.io Supply Chain Attack
มุมมอง 6794 หลายเดือนก่อน
Uncovering the Polyfill.io Supply Chain Attack
10 BEST Practices for Securely Developing with AI
มุมมอง 1884 หลายเดือนก่อน
10 BEST Practices for Securely Developing with AI
How to Create YOUR OWN (Secure) VS Code Color Theme!
มุมมอง 1.1K4 หลายเดือนก่อน
How to Create YOUR OWN (Secure) VS Code Color Theme!
9 Docker Pro Tips that will LEVEL UP your Skills
มุมมอง 3194 หลายเดือนก่อน
9 Docker Pro Tips that will LEVEL UP your Skills
Why You Should be AFRAID of PDF Files - PDF.js CVE-2024-4367
มุมมอง 3.8K5 หลายเดือนก่อน
Why You Should be AFRAID of PDF Files - PDF.js CVE-2024-4367
How to Securely Publish a VS Code Extension
มุมมอง 3595 หลายเดือนก่อน
How to Securely Publish a VS Code Extension
How to prevent SSRF Attacks in Node.js
มุมมอง 2.4K5 หลายเดือนก่อน
How to prevent SSRF Attacks in Node.js
How to Build a Secure NPM Package for ESM and CJS
มุมมอง 5785 หลายเดือนก่อน
How to Build a Secure NPM Package for ESM and CJS
10 Node.js runtime features you SHOULD be using in 2024
มุมมอง 9556 หลายเดือนก่อน
10 Node.js runtime features you SHOULD be using in 2024
How to Use GitHub Actions Environment Variables and Secrets
มุมมอง 4.3K6 หลายเดือนก่อน
How to Use GitHub Actions Environment Variables and Secrets
Why you NEED an Open Source Vulnerability Scanner
มุมมอง 9286 หลายเดือนก่อน
Why you NEED an Open Source Vulnerability Scanner
How to Choose the Best and Secure Node.js Docker Image
มุมมอง 5757 หลายเดือนก่อน
How to Choose the Best and Secure Node.js Docker Image
Very very very shallow coverage. If you mention role based authentication, cover it and how should it be structured, what roles should do, how to connect them with user tokens, also signing request and best practices. Probably would be good to mention/cover jwt. what is CSP, CORS and other dangers and how are they executed / how to defend from them. These are only thing on top of my head someone should know and I came in here to see what I don't know, instead i got information I could easily ask chatgpt if I was just learning.
Thanks for the feedback and you're absolutely right. The intention of this video is to be an introduction to the topic and lead to further potential videos based on feedback/questions that come up in response. I'm glad to hear you're already very knowledgeable on the topic 👍
@@clarkio Hi, thanks for the response. I didn't mean to be rude and I am not very well knowledgeable, but it would be nice to have more hints to advanced topics and where to learn more etc. I guess its a hard line to walk on between not being boring and being too shallow. Anyway this video made me watch some of your others vids which are a bit more in depth and they helped me a ton, thanks!
Short but covered all the points with examples 👍
Are you interested in seeing something that goes more in-depth on the topic?
@clarkio of course, each of the methods you mentioned could have it's video were your start building an app with python or js add the code, run the app to see for example how to using Oauth2 works, next time add CORS until we have a full app with all features implemented and running.
AI is not relevant to this problem. Would have written the same issue either way
Could you please put the link of Cody's video you're referring to somewhere?
Yes it's been added in the description here now and is in the original main video this clip is from. Here is the direct link so you don't have to dig for it further: th-cam.com/video/QZWPdJUwxls/w-d-xo.html
@@clarkio Thanks!
The evident problem is that the hostname can come from the client, right?
no, the URL may ALWAYS come from the client, thats how the internet works (just put it into the address line, you're done). The issue is that the Serverside accepts it without checking if it was generated and its likely there is no appropriate Authorization used for a specific sideproject (or maybe even the same authorization codes over multiple projects), and most likely the projectId is just some numerically increasing code. you can figure out easily (project 1, project 2 etc). So you can steal the token you generate from project 1 and use it to access project 2.
@@ZeruelBWelp, clearly what I said was ambiguous. Thanks, that is what I meant. Thanks for expanding.
That is an easy fix and he should never be passing in inputs like that.
I think the point is that AI be passing inputs like that all the time… so imagine all the “devs” that are just using AI to fake skills, not knowing why what AI is doing is wrong.
@@jobjobbington6884 Yes that code was generated by AI. You can see more context about how it came to be from Web Dev Cody's video here: th-cam.com/video/QZWPdJUwxls/w-d-xo.html
In the real world, one solution would be to have an external script that links to a user controlled page on the site. `<script src="/uploads/user-controlled.js"></script>`
If you made more videos like this, I'd watch all of them. Cybersecurity is challenging to learn mostly because of lack of experience and lack of real world examples breaking down why the area is vulnerable and how it was exploited and reported. You should make video examples of disclosed vulnerabilities and break them down, xss, xxe, ssrf, csrf, sqli, lfi, etc.
2nd this
@comosaycomosah are you having this same issue? What resources have you found (youtube channels, blogs, reports, websites, etc.) that helped you out the most? My major issue is that I can read 500 page cybersecurity/bug hunting/hacking/pentesting books day after day but unless I can see an example or do it physically (follow along), it just seems to be forgotten. There is so much information needed for any part of cybersecurity. I could spend years on just xss or xxe or ssrf... it's just a lot. So how did you manage this? (If any of this applies to you that is)
@@Trosshack I'm like this too I have to to do the problems myself to actually learn, watching yt channels is almost pointless I try and do things like try hackme and hackthebox another thing you can do is set up your own servers amd pentest on them
@@Trosshack I think my subscriber list is public I cant really think of many good ones right off but I've noticed a trend even good channels like loi llang yang has been shit lately. Zsecurity is good yt channel
@@comosaycomosah I 100% agree.. I really like zsecurity and also that yang hasn't made content like he used to because he taught me a lot in his early stuff... I'll just keep practicing.. in cybersecurity it seems that practice practice practice is key to understand it fully. Books are good for refreshing your knowledge or reference the information... otherwise I seem to forget 80% of the details.
This is such valuable information for anyone looking to strengthen their cybersecurity knowledge. Big thanks for sharing!❤
Thank you so much for the comment! I'm glad to hear you found this valuable 👍
@@clarkio You're very welcome! I'm always excited to support your great content. Keep up the fantastic work! 👍
He explains how to set a secret at 15:55
If a transaction is validated by a code sent to the email or phone before being carried out, would this prevent the transaction from being carried out using only cookies?
Hmm without further context it's hard to definitively say yes or no but it sounds like yes that would help ensure the request is being done intentionally by someone and not maliciously by a bad actor. Essentially, when it comes to CSRF, having a way to validate the source of the request is key to mitigating the vulnerability. One common way to mitigate CSRF is using what's called the Synchronizer Token Pattern. That involves create a unique and random token that is included in the request and the server validates it before handling the request further.
Whenever I see a ridiculous "open mouth" thumbnail. I immediately hit "do not recommend channel."
Appreciate the feedback Chuck and I definitely understand disliking that sort of thing. What are the types of thumbnails that you prefer or find yourself clicking on more then? I'm continuously learning how things work on YT and lean on a partner of ours to help with the thumbnails so it'd be super helpful to hear your suggestions and discuss this further with them.
where to find that scripts.js ?
I didn't have it available before but you can now check it out under my repo here: github.com/clarkio/ai-code-security/blob/main/cursor/public/script.js
Thanks for uploading a video on this topic.
Thank you too for the question that inspired this video 👍
Also did this help answer your question? Do you have any further questions that come to mind? Hope it helped
@@clarkio Thanks. It did help. I will let you know if I have any further questions .
0:23 "..and whatever other extremities you want to use metaphorically" lol but no this was good i been trying to use actions way more
🤣🤣🤣
omg i love it!!!!!! it's amazing
Glad to hear that!
@@clarkio only thing i dislike is how fast tokens go away
Great video, thanks for this
Can i ask you something? When searching for XSS injection areas, what JS code is most vulnerable? Is there anything specifically that stands out as vulnerable to you?
Questions are definitely welcomed. The short answer is any time there is data that is not validated for the context in which it's intended to be used. Essentially, always question those areas and assume it *could* be vulnerable to XSS. I hope that helps and feel free to share any further questions you have.
@@clarkio thank you. Fantastic advice. I also had a question about the software you use.. how accurate is it opposed to other automated tools?
@@Trosshack hmm that's a tough question for me to answer because I'm not as experienced with other tools and therefore don't want to comment without having given them a fair review first. What I can confidently say is Snyk continuously works hard on being accurate while also limiting noise for developers and security teams.
What are the main differences between SSRF and CSRF?
That's a great question and I can look into going deeper on the topic in a follow-up video if you'd like. However the quick/short answer is that CSRF happens due to trust from the client (for example your browser) to the server and SSRF happens due to trust from the server to another server/API. So for CSRF an attacker forges requests from the client to the server whereas for SSRF an attacker forges requests from the server to another dependent server or service/API. Hope that helps and let me know if you have further questions.
I would really appreciate more detailed video of this topic from you. Thanks.
@@mako13937a hey heads up that a video on this is in progress. It'll likely be published on Monday October 28
@@clarkio Thanks.
SSRF.
No available destinations to fork this repository.
That is pretty cool
Glad to hear that
"Look at me! Smarter than AI"
🤣🤣🤣
please get a fucking life
I am having trouble replicating the results you have using your project. Would I need to reduce a version of something for this to work?
If you use the 'apply' button instead of using copy/paste, then you can review the diff and accept/decline each row or set of rows. I find it much more convenient that way. I resort to copy/paste when cursor fails to apply (which occasionally happens....it's a bit "beta" sometimes).
Thanks for pointing that out. Missed it before
VS CODE KILLER!!! jk its just a fork of vs code with ai plugins
Ha yea just messing around saying that. Good to have competition
Can't switch, won't switch
Fair enough. Personally idk that I will fully switch but I’m enjoying trying it out
its not VSCode competitor if its source by forking VSCode itself
You have a point. I think if it’s got features that pull people away from VS Code though then it’s a competitor
PEAR AI PEAR AI PEAR AI PEAR AI PEAR AI PEAR AI PEAR AI PEAR AI PEAR AI
Man you can just click apply on the cursor's suggested code instead of copy and pasting them
Ah shoot yea thanks for pointing that out
Hi, can Snyk be integrated with Azure Boards?
thanks for the info about cloak i needed that
Cursor is so good for me it's almost a drop in replacement for vscode. I don't rely 100% on the AI but it's always there
Sadly, people aren't stupid enough to add user generated content as HTML instead of a span or smth😔
But, looking at the linked video title, AI is :)
you underestimate how stupid people can be
@@potatoes1549 ye but, stupid people wouldnt even learn how the <head> tag works so i doubt they'll make somethinglike this anytime soon
@@klh_io what's the AI trained on?
I never found this vulnerability in real life 😂😂😂
Guess it should be removed from the OWASP top 10 then...
@@clarkio I dunno I never found a bug outside of labs 😔
what are your vs code color settings
same question, looks beautiful
@@DexFlex_YT- It's called Deep Purple: marketplace.visualstudio.com/items?itemName=mel-brown.deep-purple
Still learning programming but i hope one day i'll be able to understand this better lol
Hey that's cool to hear you're learning programming. I'm sure you'll get there and I'm here if you have questions so don't hesitate to share them. Or if you'd like you could join our Discord community to learn more about security and programming: discord.com/invite/NXuz63GmUt
Great video but I dislike the code editor color theme. Still cool content!
Hey glad to hear you enjoyed the video and totally understand about the color theme. What's a color theme you really enjoy using? I can try it out in a future video.
@@clarkio nahh it's okay, I was bothered by some of the text color that's really hard to read in purple.. but if you really like purple, I saw an Evangelion theme but it was for neovim. I use the "Bamboo" color theme on my neovim. It's nature / forest based theme.
@@clarkioi actually really like it, but the theme is going to be a bit hard for some people to read
@@pietraderdetective8953 I kinda like purple but mostly going for consistency with the branding in these videos. I'm assuming you mean this Bamboo color theme? github.com/ribru17/bamboo.nvim That looks kinda similar to the default theme in VS Code. I did find a more green theme called Dark Green Jungle I'm kinda liking: github.com/AaBbdev29/Dark-Green-Jungle
actually enjoyed this video
Thanks! Glad to hear that
What theme are you using for pycharm? Cool vid!
I'm using Visual Studio Code (VS Code) and the theme is called Deep Purple: marketplace.visualstudio.com/items?itemName=mel-brown.deep-purple
Very Interesting video! Thanks, I’ve learned a lot.
Awesome to hear and thanks for sharing
Do you have prompts for getting information
How about "prompt kiddie"?
Nice I like that one
love this series!!!
Very glad to hear that!
Great content! I've looked into your channel and looks like all of your videos are well made. It's such a shame that they got so little views. Keep it up man!
This comment made my day! Thanks so much for sharing. We'll definitely be keeping this up. Appreciate the encouragement👍
Work smarter not harder
100%
The promise of putting HR staff out of a job.jesus Christ I've had some issues with them shemumpets
How to fix security vulnerability: Download another 150kb+ package that increases the attack vector, while implementing very basic CSP.... Nah, I'm good.
I can understand not wanting to download yet another package. So yea if you want to roll out your own mitigation code to prevent CSRF attacks that works too. However, did you mean CSRF instead of CSP?
CSRF is only one area of content security. If you are worried about CSRF on a note taking app, then you might as well check for other browser side channel attacks. Can't wait to see this 'AI' figure out how to implement XSS vulnerabilities next.