Web-security
OWASP Top 10 & Common Vulnerabilities
OWASP Top 10 & Common Vulnerabilities 1. Injection (SQL, Command, LDAP) // VULNERABLE — SQL injection const query = `SELECT * FROM users WHERE email = '${email}…
OWASP Top 10 & Common Vulnerabilities 1. Injection (SQL, Command, LDAP) // VULNERABLE — SQL injection const query = `SELECT * FROM users WHERE email = '${email}…
Auth Patterns & Secure Coding JWT Security // JWT best practices // 1. Use RS256 (asymmetric) for multi-service environments // 2. Short expiry for access token…
Save this stack to your personal DevRecall — add your own notes, track what you're learning, and share what you know with the community.
Get started — free forever