is #js the next #java applets, some may remember, there were so many viruses and hacks has been happening with #applets around 2000s at the end they drop the applets totally.

Now having #dependabot or #snyk is like just bringing a new security hole strangely opposite the intention.

Probably better to not upgrade if all versions are secure and stay there forever 😃

https://www.youtube.com/watch?v=o7NYXvYohYk

Millions of JS devs just got penetrated by a RAT…

YouTube
FYI: AppSec Tool: Speed, Accuracy, and False Positives! #shorts: What makes a good dev-centric AppSec tool? Speed is critical; aim for under 5 minutes. False positives erode trust, while false negatives are a problem too. Runtime security tools can offer rapid feedback. #AppSec #security #OWASP #Snyk #ContrastAssess https://www.youtube.com/shorts/oEIM1ckVpzE

ゲーム開発の安全性を高める第一歩〜Snyk導入のすすめ〜 #Snyk
https://dev.classmethod.jp/articles/snyk-snyk-game-2512-kdpn/

#dev_classmethod

ゲーム開発の安全性を高める第一歩〜Snyk導入のすすめ〜 #Snyk | DevelopersIO

Snykのキャラクターはパッチくん੯‧̀͡u\🐾

クラスメソッド発「やってみた」系技術メディア | DevelopersIO
ICYMI: AppSec Tool: Speed, Accuracy, and False Positives! #shorts: What makes a good dev-centric AppSec tool? Speed is critical; aim for under 5 minutes. False positives erode trust, while false negatives are a problem too. Runtime security tools can offer rapid feedback. #AppSec #security #OWASP #Snyk #ContrastAssess https://www.youtube.com/shorts/oEIM1ckVpzE
AppSec Tool: Speed, Accuracy, and False Positives! #shorts: What makes a good dev-centric AppSec tool? Speed is critical; aim for under 5 minutes. False positives erode trust, while false negatives are a problem too. Runtime security tools can offer rapid feedback. #AppSec #security #OWASP #Snyk #ContrastAssess https://www.youtube.com/shorts/oEIM1ckVpzE

[アップデート] SnykでCLIのスキャン結果をWeb UIにアップロードできるようになりました #snyk
https://dev.classmethod.jp/articles/snyk-cli-web-ui-snyk-kdpn/

#dev_classmethod

[アップデート] SnykでCLIのスキャン結果をWeb UIにアップロードできるようになりました #snyk | DevelopersIO

Snykのキャラクターはドーベルマンモデルのパッチくんと言います(ᐡ • ̫ •`ᐡ)

[アップデート] SnykでCLIのスキャン結果をWeb UIにアップロードできるようになりました #snyk | DevelopersIO
SnykでAWSをスキャンしていく #Snyk | DevelopersIO

秋の始まりを感じるこの頃・・・ 皆さん、食欲の秋を楽しんでますか?私は秋刀魚を食べました!美味しい! さて、秋なのでSnykも楽しんでいきましょうかね!

SnykでAWSをスキャンしていく #Snyk | DevelopersIO

Probely CLIをインストールして脆弱性結果を確認してみた
https://dev.classmethod.jp/articles/probely-cli-kdpn-2508/

#dev_classmethod #Snyk #セキュリティ #CLI

Probely CLIをインストールして脆弱性結果を確認してみた | DevelopersIO

Probely CLIで脆弱性チェックや!

Probely CLIをインストールして脆弱性結果を確認してみた | DevelopersIO
Probely入門!DASTツール「Probely」を試してみた。 | DevelopersIO

Probelyでスキャンしてみた

Probely入門!DASTツール「Probely」を試してみた。 | DevelopersIO

#cve #security

I need advice in how to act in the following case:

A medium-big software vendor using #golang claims that the reported CVEs by #trivy and MS defender on their statically linked binaries are false-positives.
Only #snyk would give a "correct" result.

They are not willing to share their go.mod file to verify they are not using package version XY in them.

I am somewhat skeptical about this argument. What are my best chances to find a verifiable proof to this (other than attempting to exploit the vuln?)

Are trivy and MS Defender known for false-positives in such cases?

I am in a weird spot where multiple scanners flag (multiple) binaries, the company says "all good, nothing there, error on your (scanner) side" and I need to report to the security team with 2:1 scanners in favor of the vuln being present.