Why NOT To Pin TLS Certificates | Tanner Prynn TODO

[What’s the right UX for an expired certificate? Emily M. Stark](

On the left, on the right and wiggle in the middle

The 6 Fundamental Forces of Information Security Risk

Cheat Engine: Introduction (tutorial 1-4) - Game Hacking Series - YouTube

Force 1: Information wants to be Free

#NahamCon2022EU: Command-Line Data-Wrangling by Tomnomnom - YouTube

emtunc/SlackPirate: Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace Mikail Tunç


Ceremonial Security and Cargo Cults

[Exploiting Application Logic to Phish Internal Mailing Lists by Tanner Jan, 2023 Medium](

Praetorian ‘open-sources’ its Nosey Parker secret scanning tool | SC Media Praetorian Open Sources Regular Expression-Based Scanning Capabilities Meet Nosey Parker - An Artificial Intelligence Based Scanner That Sniffs Out Secrets - Praetorian Mining for Secrets: Repos, firmware, and more - Black Hat Europe 2022 | Arsenal Schedule praetorian-inc/noseyparker: Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history. Six Months of Finding Secrets with Nosey Parker - Praetorian

(18) SLNT MISSION TV on Twitter: “Just streamed Semgrep rule writing 101 for the Crystal/Marten web framework. I cover going from playground rule writing to using the tool to find issues in a codebase. Also created a CLI and web server on Replit, check it out!” / Twitter

[Security Drone: Scaling Continuous Security at Revolut by Krzysztof Pranczk Revolut Tech Jan, 2023 Medium](

In the future, can you have your appsec cake and eat it as well ?

[How we’re creating a threat model framework that works for GitLab GitLab](
[CISA’s Take on Vulnerability Prioritization and Management by Chris Hughes Nov, 2022 Medium](

yeswehack/vulnerable-code-snippets: Twitter vulnerable snippets

[The immutable laws of security Microsoft Learn](
[Expanding on UUIDv1 Security Issues by Chaim Sanders Oct, 2022 ITNEXT](

Exploit Prediction Scoring System (EPSS) - Tributary Chris Hughes

This one covers the Exploit Prediction Scoring System (EPSS) which is emerging to replace/compliment CVSS in organizations maturing their Vulnerability Management practices. It is run by the same group that runs CVSS( FIRST).

What I Learned About Information Security From Academia

The AppSec letter bomb problem

DEF CON 30 - Eugene Lim- You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties - YouTube

The mindset shift from security to trust & safety

[Why we use Terraform and not Chef, Puppet, Ansible, Pulumi, or CloudFormation by Yevgeniy Brikman Gruntwork](

How We Use Terraform At Slack - Slack Engineering

Terraform Gains Visibility, Self-Service, and Compliance Upgrades

(2) Sherrod DeGrippo 📬 on Twitter: “A lot of talk about threat modeling lately. Let me give you some idea of why I hate it and think threat modeling is bullshit. I’ll also tell you what I think is better. I’m going to use $BIGCO as my example. Here’s a long thread. #infosec #blueteam #malware #skincare 🔜🧵” / Twitter

(19) Lari Huttunen 🇫🇮 🌻 🇺🇦 on Twitter: “1/ This time, my write-up on Public Exposure focuses on #WordPress releases and is filled with famous Jazz cats and #vulnerabilities.” / Twitter

(19) Federico Maggi on Twitter: “Given that Intel Alder Lake related code has been (allegedly) leaked, I thought it may be useful to have some simple @semgrep patterns ready to support manual code review. 🤯 Take them with grain of salt! Largely inspired by @binarly_io FwHunt Scanner.” / Twitter TODO

r2c blog — Fully loaded: testing vulnerable PyYAML versions TODO

Comparing Semgrep and CodeQL · Doyensec’s Blog TODO

akabe1/akabe1-semgrep-rules: My collection of Semgrep rules for vulnerability detection on source code (swift, java)

mrnfrancesco/GreedyForSQLi: Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX

(29) Francesco Marano on Twitter: “After presenting it at #ComeToCode and #LinuxDay, all the details on how we found 71 SQL Injection on 13 #Wordpress plugins is now open source! GitHub repository: #opensource #sqlinjection #sqli #cve #codereview #semgrep #cybersecurity #vulnerability” / Twitter

logto-io/logto: 🧑‍🚀 Logto helps you build the sign-in, auth, and user identity within minutes. We provide an OIDC-based identity service and the end-user experience with username, phone number, email, and social sign-in, for web and native apps.

Google & Apache Found Vulnerable to GitHub Environment Injection

Introducing OpenCRE - Spyros Gasteratos - YouTube

Crucial Questions from Governments and Regulators

Born-left security: The new approach taking over shift-left | LeadDev TODO Adam Berman, Bain “you merely adopted shift left, I was born into it” meme

GF - Climbing the Production Mountain: Practical CI/CD Attacks Using CI/CD Goat - YouTube

Crucial Questions from CISOs and Security Teams

Security Roadmap, Strategies and Challenges — My Learnings - Part-1 » Whiskey Tango Foxtrot - from Twitter DM

[DORA 2022 Accelerate State of DevOps Report now out Google Cloud Blog](

Why SCA for Security is Really Hard TODO

r2c blog — Need for speed: static analysis version Brandon Wu

Product Security Roadmap

Crucial Questions from CIOs and CTOs

Process injection: breaking all macOS security layers with a single vulnerability · Sector 7

(16) Kelley Mak on Twitter: “The most challenging part of security isn’t convincing people they need it, but providing actionable guidance on how to be secure To do that, everyone, not only the security team, needs context and data about how to make the right decisions. Security teams can help 1/” / Twitter


Load external data into OPA: The Good, The Bad, and The Ugly - DEV Community

Permify/permify: Permify is an open-source authorization service & policy engine based on Google Zanzibar. We have built an open-source authorization service & policy engine based on Google Zanzibar TODO

[Introducing Entitlements: GitHub’s open source Identity and Access Management solution The GitHub Blog](

Minimum Viable Secure Product

  • Maybe already included in tl;dr sec

(1) Jason Chan - Building a Glass House - YouTube

[Security Model - Terraform Cloud Terraform by HashiCorp](

open-policy-agent/setup-opa: Sets up Open Policy Agent CLI in your GitHub Actions workflow.

[Why You Should Avoid Sealed Secrets in Your GitOps Deployment by Denilson N. Better Programming](

Product Security Roadmap

Crucial Questions from CEOs and Boards


I ended up baking it into “the book” which has already been published. The “What does a security team do” section is new, and mostly clarifies how decision making happens to a newcomer. TODO

Thinkstscapes 2022.Q2 TODO

(20) Ryan Naraine on Twitter: “Meta (Facebook) has a paper out describing its core security principles - <- direct PDF” / Twitter

Lure attackers with ggcanary, the GitGuardian Canary Tokens

TODO Venables security metrics

How do JavaScript frameworks impact the security of applications? - Ksenia Peguero - YouTube

Belenux Relive the conference

It’s impossible to find every vulnerability, so we don’t try to

[Insights from Hashicorp: Securing the software they ship GitHub InFocus · Virtual 2022· Starting April 26](

We5ter/Scanners-Box: A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑

[Shipping multi-tenant SaaS using Postgres Row-Level Security Nile](

(20) Snowflake on Twitter: “Learn from Devdatta Akhawe and Max Burkhardt how the #DataCloud and security tools such as @runpanther, have enabled them to build a unique security program to protect the ideas, designs & plans of orgs around the world ⤵ #CyberSecurity cc @Figma” / Twitter

harmj0y (@Will Schroeder) Tweeted: Hey, do you like tokens? Have you always wanted to “harvest” tokens for offensive purposes? If so check out my new post where I show I can (finally) write a technical post without memes, and then check out the Koh toolset at TODO

[Arbitrary File Upload Tricks In Java ](
[Security Code Audit - For Fun and Fails Frycos Security Diary](
[Command Injection in the GitHub Pages Build Pipeline Blog by Joren Vrancken](

TODO: checklist tool/blog from Julian Berton

  • Also add to BSidesSF slides


The State of the State of Application Exploits in Security Incidents From Ryan Nairraine’s list: This study is an attempt to stitch together a more complete view of the application security elephant. We examine published industry reports from multiple sources to develop a better understanding of the frequency and role of application exploits in security incidents. Along the way, we’ll demonstrate the challenges of multi-source analysis and offer recommendations on how research producers can make it easier for those who want to piece together the bigger picture.

Just 2.6% of 2019’s 18,000 tracked vulnerabilities were actively exploited in the wild • The Register

[Language Agnostic Security Code Review](

(74) Spreading security across the SDLC (with semgrep and other tools) - YouTube

  • Referenced by RSA slides *
  • You can’t just copy what a FAANG company is doing - they have a whole ecosystem of internal tools, culture, processes, and other things that affect what they do and how they do it.

By Mario Platt

Measuring Security: An OWASP Panel
Measuring security is important, but it can be hard in practice and unintuitive or at least non obvious in a number of ways. Which is why I was so excited to read Tad Whitaker’s excellent (and funny) summary of a Bay Area OWASP meet-up panel he moderated on measuring security metrics (video), consisting of a solid crew of Charles Nwatu, Rich Seiersen (co-author of “How To Measure Anything In Cybersecurity Risk”), and Caroline Wong. I liked Tad’s post so much that I pulled out some of the key points I wanted to make sure to remember into this mini post.

Cybersecurity Budget Benchmarks are a Waste of Time

  • Budget is an input not an outcome. Security needs to be centered on outcomes.

  • No taxonomy of comparison - not comparing apples to apples.

  • Misaligned incentives. Good security reduces unit cost.

HackerOne_HPSR_2020 pdf from Marten

TODO: Chris Schneider tool, threagile, listo tool

Security along the Container-based SDLC by Chilcano


Also, it’s interesting how there seems to be general industry consensus on what sort of security checks and processes you should do at which points in the SDLC, though they’re sometimes portrayed differently visually. Here’s another I saw on Denis Yakimov’s DevSecOps: Principles and Comparison of SCA post:

DevOps Pipeline Diagram

C4 threat modelling this website

Another one you might be interested in, from a colleague of mine, who combines C4 architecture, STRIDE and LINDDUN, and introduces the concepts of Trust:Value ratio and Aggregated Risks for threat modeling -> - something we do internally here. H/T @HazanaSec - Context, Containers, Components and Code

TODO Julian Berton blog post / tool

  • Also reference goSDL talk
  • Potentially create threat-modeling blog post with talks/tools, don’t worry about having things perfect

7 years at Mozilla
I met Julien Vehent when we were both speaking at DevSecCon Seattle 2019, and he quickly became one of my favorite people whose work I follow in building a modern AppSec program, security automation, etc.

[Building well-architected serverless applications: Managing application security boundaries – part 1 AWS Compute Blog](
[Serverless Land Resources for learning about AWS serverless technology](

AWS Access Analyzer Policy Checks Explained
K9 Security’s Stephen Kuenzli Authoring secure and functional policies just got a lot easier with over 100 policy checks from Access Analyzer. Here is why this launch 🚀is a game changer (1/12) Following the release of AWS Access Analyzer - Policy Validation. I wanted to follow the principle of “Eating your own dog food”. So, I’ve analyzed all 837 AWS Managed Policies provided by AWS themself.


ScaleSec/terraform_aws_scp: AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform. ScaleSec/project_lockdown: GCP Auto Remediation Suite for High Risk Events ScaleSec/gcp_threat_detection_auto_remediation: This repo contains all you need to begin automating Event Threat Detection findings. Automate Security on GCP with Event Threat Detection | ScaleSec

[Indeni Cloudrail Case Study: Eating Dogfood and Enjoying it Indeni](

Building a Data-driven AppSec Programme with Kiln

BSidesLeeds talk Dan Murphy