Hacking the Security Footprint of Open Source Dependencies
Leveraging open source modules is a common way for developers to deliver complex functionality quickly. However, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce severe vulnerabilities into your application, exposing your application and your user's data.
That’s why Snyk and Trend Micro are partnering to deliver a new approach to security end-to-end application security. In this live hacking session, Andre Alves, a Trend Micro Cloud Security Architect, will team up with Snyk’s Liran Tal to explain the value of finding and fixing vulnerabilities at the source and protecting applications in runtime. This talk will use a sample application, Goof, which uses various vulnerable dependencies, which we will exploit as an attacker would. For each issue, we'll explain why it happened, show its impact, and – most importantly – see how to avoid or fix it.
Watch This Black Hat Session On Demand
“We get audited all year long. By using Snyk, we can say we’ve secured our open source pipeline. So it’s not just about improving our security exposure but also supporting our compliance efforts.”
Evangelos Deirmentzoglou, Interim Head of Security