Secure Coding Guidelines for Java SE Logo

Secure Coding Guidelines for Java SE

0
Free
Visit Website

Java's architecture and components include security mechanisms that can help to protect against hostile, misbehaving, or unsafe code. However, following secure coding best practices is still necessary to avoid bugs that could weaken security and even inadvertently open the very holes that Java's security features were intended to protect against. These bugs could potentially be used to steal confidential data from the machine and intranet, misuse system resources, prevent useful operation of the machine, assist further attacks, and many other malicious activities.

FEATURES

ALTERNATIVES

InQL is a Burp Suite extension for advanced GraphQL testing and vulnerability detection

Protect your Fastify server against CSRF attacks with a series of utilities and recommendations for secure application development.

WackoPicko is a vulnerable website with known vulnerabilities, now available as a Docker image and included in the OWASP Broken Web Applications Project.

Cross-site scripting labs for web application security enthusiasts

A static code analysis tool for parsing common data formats to detect hardcoded credentials and dangerous functions.

Checkmarx One SAST is a static application security testing tool that combines speed and security to improve developer experience.

A third-party Nginx module that prevents common web attacks by reading a small subset of simple rules containing 99% of known patterns involved in website vulnerabilities.

ESLint plugin to prevent Trojan Source attacks.