Security

When Your AI Code Agent Becomes an RCE Engine

If your AI code agent treats repository content as instructions, any contributor can execute commands. This article maps the direct injection attack surface and …

Keeping your software healthy: the critical role of dependency updates

Discover best practices for effective dependency management in software development and learn strategies to keep your projects secure, efficient, and free of …

Using Self-Signed Multi-Domain Certificates

Self-signed certificates are usually used for TLS authentication on non-production environments. We’ll discuss here how to generate proper certificate for …

Logging policy

There are different points of view on how logging levels should be used in code. I will share mine. My assumption is: “There should be no errors in logs …

Secure Java coding best practices

Making your web application flawless against security attacks is a challenge for every java developer. In this article I will briefly describe common practical …

Secure Java logging with Logback

Deploying application into secure environment adds some restrictions on logging and log management. OWASP community gives some useful recommendations.