#security
Read more stories on Hashnode
Articles with this tag
Committing in your workflow can normally be done using git commands or other actions that perform commits for you. However, if your repository...
Next.js lacks many built-in security measures. In fact, it doesn't offer predefined configurations for your Content Security Policy (CSP)....
With the integration of AppRouter, Next.js undergoes significant internal changes in component loading and management. Underneath, AppRouter defaults...
Semgrep is an incredible static analysis engine that can be used for finding bugs, detecting vulnerabilities and even for enforcing code...
Log Injection is an attack that has been known to everyone for years. Despite the fact that any application can record logs from user input, for too...
When you develop an Angular application, you will come to a point where you need to serve it on localhost over HTTPS. This is often the case if you...