SlideShare a Scribd company logo
Finding Security Vulnerabilities
Before They Find You!
Stranger Danger
@liran_tal
Fun
Fun + T-Shirt
Fun + T-Shirt + Stickers
Node.js Security WG
Liran Tal
OWASP NodeGoat
author of Essential Node.js Security
& O’Reilly’s Serverless Security
Developer Advocate
@liran_tal
@liran_tal
open source is
awesome
@liran_tal
open source
packages
1.4M+
@liran_tal
source: https://dev.to/leoat12/the-nodemodules-problem-29dc
@liran_tal
How much do you really know about
your dependencies ?
@liran_tal
“Dependency on China and other adversary countries
for some of our most critical supply chains threatens to
undermine the trustworthiness of critical technologies
and components that constitute and connect to
cyberspace.”
source: https://www.solarium.gov/public-communications/supply-chain-white-paper
● Protecting supply chains
from compromise
● Establishing a Center for
Open-Source Software
Security
@liran_tal
source: https://snyk.io/blog/how-much-do-we-really-know-about-how-packages-behave-on-the-npm-registry
@liran_tal
@liran_tal
source: https://snyk.io/blog/how-much-do-we-really-know-about-how-packages-behave-on-the-npm-registry
*abandoned packages
61%
@liran_tal
source: http://bit.ly/es-incident
@liran_tal
some popular
packages reach more
than 100,000
@liran_tal
event-stream
reached 5,466
@liran_tal
Your App
@liran_tal
Your App
Your Code
@liran_tal
@liran_tal
source: https://snyk.io/open-source-security
@liran_tal
Jan 2015
rimrafall
Jan 2017
crossenv
May 2018
getcookies
Jul 2018
eslint-scope
Nov 2018
event-stream
@liran_tal
May 2018
getcookies
Parse HTTP headers for cookie data
@liran_tal
May 2018
getcookies
Parse HTTP headers for cookie data
or does it...?
@liran_tal
@liran_tal
@liran_tal
getcookies
express-cookies
http-fetch-cookies
@liran_tal
getcookies
express-cookies
http-fetch-cookies
mailparser 440,000 downloads/month
@liran_tal
sequelize SQL injection vulnerability
428,791 weekly downloads
Fixed in 5.15.1 (August 2019)
source: https://snyk.io/vuln/npm:sequelize
@liran_tal
yarn MiTM security vulnerability
992,512 weekly downloads
Fixed in 1.17.3 (July 2019)
source: https://snyk.io/vuln/npm:yarn
@liran_tal
markdown-to-jsx Cross-site Scripting vulnerability
897,115 weekly downloads
Fixed in 6.10.1 (May 2019)
source: https://snyk.io/vuln/npm:markdown-to-jsx
@liran_tal
from dependency vulnerabilities
to application vulnerabilities
@liran_tal
Application Security is Challenging!
@liran_tal
Application Security is Challenging!
delivery 🚀
@liran_tal
Top 10 US
Computer Science
Programs
Carnegie Mellon
MIT
Stanford
University of California, Berkeley
University of Illinois, Urbana-Champaign
Cornell
University of Washington
Georgia Tech
Princeton
University of Texas, Austin
source: http://tiny.cc/o98gdz
@liran_tal
Top 10 US
Computer Science
Programs
@liran_tal
Understanding the impact of
security fixes
@liran_tal
@liran_tal
@liran_tal
Attackers are targeting open source
one vulnerability == many victims
@liran_tal
What if security was developer-friendly
easier
actionable
source: https://snyk.io/vuln/npm:yarn
@liran_tal
source: https://snyk.io
@liran_tal
source: https://snyk.io
@liran_tal
source: https://snyk.io
@liran_tal
Best Practices
for Open Source Security
@liran_tal
Have a responsible disclosure policy
Enable 2FA, protect your users
Scan often and fix your dependencies
Release security fixes as non-major
https://snyk.io/blog/ten-npm-security-best-practices
@liran_tal
https://snyk.io/blog/ten-npm-security-best-practices
Please Enjoy Responsibly
Open Source is Awesome
@liran_tal

More Related Content

PDF
OWASP Workshop: Docker Image Security Best Practices by Liran Tal - January 2020
Liran Tal
 
PDF
Securing containers by Breaking In - Liran Tal - DevSecCon Tel Aviv 2019
Liran Tal
 
PDF
Liran tal Stranger Danger Security vulnerabilities - Negev Web Developers mee...
Liran Tal
 
PDF
Stranger Danger: Securing Third Party Components (Tech2020)
Guy Podjarny
 
PDF
DevSecCon Singapore 2018 - Maginot Line – 6 Common AppSec Anti-Patterns Preve...
DevSecCon
 
PDF
Secure Node Code (workshop, O'Reilly Security)
Guy Podjarny
 
PDF
30+ Nexus Integrations to Accelerate DevOps
Sonatype
 
PPTX
Node.js Module: I Choose You!
Bethany Nicolle Griggs
 
OWASP Workshop: Docker Image Security Best Practices by Liran Tal - January 2020
Liran Tal
 
Securing containers by Breaking In - Liran Tal - DevSecCon Tel Aviv 2019
Liran Tal
 
Liran tal Stranger Danger Security vulnerabilities - Negev Web Developers mee...
Liran Tal
 
Stranger Danger: Securing Third Party Components (Tech2020)
Guy Podjarny
 
DevSecCon Singapore 2018 - Maginot Line – 6 Common AppSec Anti-Patterns Preve...
DevSecCon
 
Secure Node Code (workshop, O'Reilly Security)
Guy Podjarny
 
30+ Nexus Integrations to Accelerate DevOps
Sonatype
 
Node.js Module: I Choose You!
Bethany Nicolle Griggs
 

What's hot (20)

PDF
DevSecOps: Finding the Adversaries in our Midst
DevOps.com
 
PPTX
Tizen Security
Jason Ross
 
PDF
Discovering and Fixing Dependency Vulnerabilities for Kubernetes apps with Sn...
Codefresh
 
PPTX
Don’t Ignore GitHub Security Alerts, Automate Them Into Your Workflow.
Ashley Wolf
 
PPTX
Android pentesting
Mykhailo Antonishyn
 
PDF
Android pentesting
Mykhailo Antonishyn
 
PDF
Continuous Security in Pipelines
Thoughtworks
 
PDF
DevSecOps for Developers: How To Start
Patricia Aas
 
PDF
Node.js Security Done Right - Tips and Tricks They Won't Teach You In School
Liran Tal
 
PDF
Adversary Driven Defense in the Real World
James Wickett
 
PPTX
Drozer - An Android Application Security Tool
nullowaspmumbai
 
PDF
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
James Wickett
 
PDF
Designing & Building Secure Web APIs
CodeOps Technologies LLP
 
PDF
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PDF
OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amste...
Codemotion
 
PDF
Hijacking Softwares for fun and profit
Nipun Jaswal
 
PPTX
(java2days) The Anatomy of Java Vulnerabilities
Steve Poole
 
DevSecOps: Finding the Adversaries in our Midst
DevOps.com
 
Tizen Security
Jason Ross
 
Discovering and Fixing Dependency Vulnerabilities for Kubernetes apps with Sn...
Codefresh
 
Don’t Ignore GitHub Security Alerts, Automate Them Into Your Workflow.
Ashley Wolf
 
Android pentesting
Mykhailo Antonishyn
 
Android pentesting
Mykhailo Antonishyn
 
Continuous Security in Pipelines
Thoughtworks
 
DevSecOps for Developers: How To Start
Patricia Aas
 
Node.js Security Done Right - Tips and Tricks They Won't Teach You In School
Liran Tal
 
Adversary Driven Defense in the Real World
James Wickett
 
Drozer - An Android Application Security Tool
nullowaspmumbai
 
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
James Wickett
 
Designing & Building Secure Web APIs
CodeOps Technologies LLP
 
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
OWASP-SKF Making the web secure by design - Glenn ten Cate - Codemotion Amste...
Codemotion
 
Hijacking Softwares for fun and profit
Nipun Jaswal
 
(java2days) The Anatomy of Java Vulnerabilities
Steve Poole
 
Ad

Similar to Stranger Danger - Finding vulnerabilities before they find you - Liran Tal 2021 (20)

PDF
The State of Open Source Security - Liran Tal - 2019 NodeJS+Interactive Montreal
Liran Tal
 
PPTX
IoTNEXT 2016 - SafeNation Track
Priyanka Aash
 
PPTX
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
PPTX
Rise of software supply chain attack
Yadnyawalkya Tale
 
PPTX
Open Source Insight: Apache Struts Exploits, Cloudera IPO Risks & the Next Cy...
Black Duck by Synopsys
 
PPTX
5 Ways To Fight A DDoS Attack
RedZone Technologies
 
PPTX
Dll hijacking
D4rk357 a
 
PPTX
Dll hijacking
D4rk357 a
 
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
PDF
Introduction to Deep Web
IRJET Journal
 
PDF
Open Source Security and ChatGPT-Published.pdf
Javier Perez
 
PDF
RSA2015: Securing the Internet of Things
Daniel Miessler
 
PDF
Liran Tal - StrangerDanger - Finding Security Vulnerabilities Before They Fin...
Liran Tal
 
PDF
Deep dive nella supply chain della nostra infrastruttura cloud
sparkfabrik
 
PPTX
AzureSecurity - Day2 - Azure Network Security
2nd Sight Lab
 
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
PDF
Tsunami of Technologies. Are we prepared?
msyukor
 
PPTX
tspann06-NOV-2024_AI-Alliance_NYC_ intro to Data Prep Kit and Open Source RAG
Timothy Spann
 
PDF
The Internet of Things: We've Got to Chat
Duo Security
 
PPTX
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Blueboxer2014
 
The State of Open Source Security - Liran Tal - 2019 NodeJS+Interactive Montreal
Liran Tal
 
IoTNEXT 2016 - SafeNation Track
Priyanka Aash
 
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
Rise of software supply chain attack
Yadnyawalkya Tale
 
Open Source Insight: Apache Struts Exploits, Cloudera IPO Risks & the Next Cy...
Black Duck by Synopsys
 
5 Ways To Fight A DDoS Attack
RedZone Technologies
 
Dll hijacking
D4rk357 a
 
Dll hijacking
D4rk357 a
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
Introduction to Deep Web
IRJET Journal
 
Open Source Security and ChatGPT-Published.pdf
Javier Perez
 
RSA2015: Securing the Internet of Things
Daniel Miessler
 
Liran Tal - StrangerDanger - Finding Security Vulnerabilities Before They Fin...
Liran Tal
 
Deep dive nella supply chain della nostra infrastruttura cloud
sparkfabrik
 
AzureSecurity - Day2 - Azure Network Security
2nd Sight Lab
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
Tsunami of Technologies. Are we prepared?
msyukor
 
tspann06-NOV-2024_AI-Alliance_NYC_ intro to Data Prep Kit and Open Source RAG
Timothy Spann
 
The Internet of Things: We've Got to Chat
Duo Security
 
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Blueboxer2014
 
Ad

Recently uploaded (20)

PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPTX
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PPTX
AI ad its imp i military life read it ag
ShwetaBharti31
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PPT
Transformaciones de las funciones elementales.ppt
rirosel211
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
AI ad its imp i military life read it ag
ShwetaBharti31
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
Transformaciones de las funciones elementales.ppt
rirosel211
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 

Stranger Danger - Finding vulnerabilities before they find you - Liran Tal 2021