<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Naveen</title>
    <description>The latest articles on Forem by Naveen (@naveenda).</description>
    <link>https://forem.com/naveenda</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F56450%2F2a744650-ee0f-46ca-8038-bb0f9227dfa4.png</url>
      <title>Forem: Naveen</title>
      <link>https://forem.com/naveenda</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/naveenda"/>
    <language>en</language>
    <item>
      <title>Insertion sort using go</title>
      <dc:creator>Naveen</dc:creator>
      <pubDate>Mon, 28 Jun 2021 04:17:47 +0000</pubDate>
      <link>https://forem.com/naveenda/insertion-sort-using-go-5hd3</link>
      <guid>https://forem.com/naveenda/insertion-sort-using-go-5hd3</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmc3o5n9b2n6u9yoqzg1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmc3o5n9b2n6u9yoqzg1n.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;center&gt;&lt;small&gt; Photo by &lt;a href="https://unsplash.com/@sumekler?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText" rel="noopener noreferrer"&gt;Jarosław Kwoczała&lt;/a&gt; on &lt;a href="https://unsplash.com/s/photos/cards?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText" rel="noopener noreferrer"&gt;Unsplash&lt;/a&gt;
  &lt;/small&gt;&lt;/center&gt;

&lt;p&gt;Sorting is always a good start point to learn algorithm. Not only it is easy but it also quite challenging too, that's why we have plenty of sorting algorithms are available.&lt;/p&gt;

&lt;p&gt;Now, lets talk about Insertion Sort.&lt;/p&gt;

&lt;h3&gt;
  
  
  Insertion Sort
&lt;/h3&gt;

&lt;p&gt;Insertion Sort algorithm is relatively a simple an efficient algorithm for sorting a smaller array.&lt;br&gt;
It works the way many people sort a hand of playing cards.&lt;/p&gt;

&lt;p&gt;We start an empty hand, remove one card from the table and one card into the hand in the correct position.&lt;br&gt;
For that, we need to compare the previous card from hand. If the previous value is bigger than new card then move previous card to right and move current card to the left (Basically, just swap position based on value).&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuskie5f31sxn2wz128q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuskie5f31sxn2wz128q.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
 Enough talk, let do this in code.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight go"&gt;&lt;code&gt;&lt;span class="k"&gt;package&lt;/span&gt; &lt;span class="n"&gt;main&lt;/span&gt;

&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="s"&gt;"fmt"&lt;/span&gt;

&lt;span class="k"&gt;func&lt;/span&gt; &lt;span class="n"&gt;main&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="c"&gt;// declare an array&lt;/span&gt;
    &lt;span class="n"&gt;items&lt;/span&gt; &lt;span class="o"&gt;:=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="m"&gt;6&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="kt"&gt;int&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="m"&gt;5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="m"&gt;2&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="m"&gt;4&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="m"&gt;6&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="m"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="m"&gt;3&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;
    &lt;span class="c"&gt;// calculate length of array&lt;/span&gt;
    &lt;span class="k"&gt;var&lt;/span&gt; &lt;span class="n"&gt;n&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="c"&gt;// loop through array&lt;/span&gt;
    &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="o"&gt;:=&lt;/span&gt; &lt;span class="m"&gt;1&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="n"&gt;n&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt;&lt;span class="o"&gt;++&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="c"&gt;// set limit for current index (for leftside shift)&lt;/span&gt;
        &lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;:=&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt;
        &lt;span class="c"&gt;// loop through array until we reach the last element&lt;/span&gt;
        &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="m"&gt;0&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
            &lt;span class="c"&gt;// If the Item from right side is greater than left side&lt;/span&gt;
            &lt;span class="c"&gt;// we need to swap the values&lt;/span&gt;
            &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="m"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
                &lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="m"&gt;1&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="m"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
            &lt;span class="p"&gt;}&lt;/span&gt;
            &lt;span class="c"&gt;/*
            * else {
            * no need to swap, because this unit already sortted
            * }*/&lt;/span&gt;

            &lt;span class="c"&gt;// reduce inner index by one&lt;/span&gt;
            &lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="m"&gt;1&lt;/span&gt;
        &lt;span class="p"&gt;}&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;
    &lt;span class="n"&gt;fmt&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="n"&gt;Println&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;items&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Gist Link :&lt;a href="https://gist.github.com/NaveenDA/3f71583594a2795c838ab4e044c09d35" rel="noopener noreferrer"&gt;https://gist.github.com/NaveenDA/3f71583594a2795c838ab4e044c09d35&lt;/a&gt;&lt;/p&gt;


&lt;p&gt;I recommend everyone should try this algorithm in your favorite programming language. It improve our knowledge and more importantly it gives some challenges until we solve it.&lt;br&gt;&lt;br&gt;
 &lt;/p&gt;


&lt;center&gt;Thanks for reading &amp;lt;3.&lt;/center&gt;

</description>
      <category>go</category>
      <category>sort</category>
    </item>
    <item>
      <title>What everyone must know about front end security?</title>
      <dc:creator>Naveen</dc:creator>
      <pubDate>Fri, 10 Jul 2020 13:53:20 +0000</pubDate>
      <link>https://forem.com/naveenda/what-everyone-must-know-about-front-end-security-1nb3</link>
      <guid>https://forem.com/naveenda/what-everyone-must-know-about-front-end-security-1nb3</guid>
      <description>&lt;p&gt;Is Front End Security is a real thing?&lt;br&gt;
     Hmm… the truth is yes, it is.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--v4BTWfjg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/05qdep90qf6v4qv4qaj8.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--v4BTWfjg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/05qdep90qf6v4qv4qaj8.gif" alt="Real Gif"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Security is of paramount importance, no matter front end security or backend security. When I googled “Front End Security”, I could found the proper article, so I decided to write an article about “The Ultimate Guide To Front End Security”.&lt;/p&gt;

&lt;p&gt;In this article, I will show some of the important concepts &amp;amp; best practice for improving your application front-end security.&lt;/p&gt;
&lt;h2&gt;
  
  
  XSS
&lt;/h2&gt;

&lt;p&gt;Cross side script is one of the deadliest things when comes to security. &lt;/p&gt;
&lt;h4&gt;
  
  
  Why it so evil?
&lt;/h4&gt;

&lt;p&gt;In every year OSWAP top 10 vulnerabilities list, definitely it in the list.&lt;br&gt;
It a client-side code injection, Imagine if you add a comment a blog post with some javascript, now you access every user's cookie who read your blog.&lt;br&gt;
Sometimes it called as &lt;strong&gt;Landmine&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Okay reading a cookie is a potential threat, but what are the things are XSS can do.&lt;/p&gt;

&lt;blockquote&gt;
&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Ad-Jacking&lt;/strong&gt;  - If you manage to get stored XSS on a website, just inject your ads in it to make money ;)&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Click-Jacking&lt;/strong&gt;  - You can create a hidden overlay on a page to hijack clicks of the victim to perform malicious actions.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Session Hijacking&lt;/strong&gt;  - HTTP cookies can be accessed by JavaScript if the HTTP ONLY flag is not present in the cookies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Content Spoofing&lt;/strong&gt;  - JavaScript has full access to client-side code of a web app and hence you can use it show/modify desired content.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Credential Harvesting&lt;/strong&gt;  - The most fun part. You can use a fancy popup to harvest credentials. WiFi firmware has been updated, re-enter your credentials to authenticate.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Forced Downloads&lt;/strong&gt;  - So the victim isn’t downloading your malicious flash player from absolutely-safe.com? Don’t worry, you will have more luck trying to force a download from the trusted website your victim is visiting.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Crypto Mining&lt;/strong&gt;  - Yes, you can use the victim’s CPU to mine some bitcoin for you!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Bypassing CSRF&lt;/strong&gt;  protection - You can make POST requests with JavaScript, you can collect and submit a CSRF token with JavaScript, what else do you need?&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keylogging&lt;/strong&gt;  - You know what this is.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Recording Audio&lt;/strong&gt;  - It requires authorization from the user but you access victim’s microphone. Thanks to HTML5 and JavaScript.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Taking pictures&lt;/strong&gt;  - It requires authorization from the user but you access victim’s webcam. Thanks to HTML5 and JavaScript.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Geo-location&lt;/strong&gt;  - It requires authorization from the user but you access victim’s Geo-location. Thanks to HTML5 and JavaScript. Works better with devices with GPS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Stealing HTML5 web storage data&lt;/strong&gt;  - HTML5 introduced a new feature, web storage. Now a website can store data in the browser for later use and of course, JavaScript can access that storage via window.localStorage() and window.webStorage() Browser &amp;amp; System&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fingerprinting&lt;/strong&gt;  - JavaScript makes it a piece of cake to find your browser name, version, installed plugins and their versions, your operating system, architecture, system time, language and screen resolution.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Network Scanning&lt;/strong&gt;  - Victim’s browser can be abused to scan ports and hosts with JavaScript.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Crashing Browsers&lt;/strong&gt;  - Yes! You can crash browser with flooding them with….stuff.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Stealing Information&lt;/strong&gt;  - Grab information from the webpage and send it to your server. Simple!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Redirecting&lt;/strong&gt;  - You can use javascript to redirect users to a webpage of your choice.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Tabnapping&lt;/strong&gt;  - Just a fancy version of redirection. For example, if no keyboard or mouse events have been received for more than a minute, it could mean that the user is AFK and you can sneakily replace the current webpage with a fake one.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Capturing&lt;/strong&gt;  Screenshots - Thanks to HTML5 again, now you can take a screenshot of a webpage. Blind XSS detection tools have been doing this before it was cool.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Perform Actions&lt;/strong&gt;  - You are controlling the browser,&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;Taken from &lt;a href="https://security.stackexchange.com/a/206526"&gt;https://security.stackexchange.com/a/206526&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  How to prevent it?
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;You have to more carefully when comes to display user input.&lt;/li&gt;
&lt;li&gt;Use Front Framework like react, angular, etc. It designs that to rid the XSS&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;
  
  
  CSP
&lt;/h2&gt;

&lt;p&gt;Content security policy is the security layer is used to detect and prevent various attack including XSS.&lt;br&gt;
Strong CSP can able to prevent much potential thread. You can easily enable by adding &lt;code&gt;Content-Security-Policy&lt;/code&gt; header.&lt;br&gt;
Read more about CSP on &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy"&gt;MDN Docs&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Referrer value
&lt;/h2&gt;

&lt;p&gt;If the link is taken to a third party domain, that domain has access to your last URL. You might think, it is not potential thread, but that URL might contain sensitive data like session-id, API-key, etc.&lt;/p&gt;

&lt;p&gt;To prevent this attack, set the &lt;code&gt;Referrer-Policy&lt;/code&gt; header with &lt;code&gt;no-referrer&lt;/code&gt; value.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"Referrer-Policy": "no-referrer"
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;h2&gt;
  
  
  Feature policy
&lt;/h2&gt;

&lt;p&gt;Always restrict to access something, which is not needed in your web application.&lt;br&gt;
We can tell the browser to disable some of the browser's functionalities/features by adding &lt;code&gt;Feature-Policy&lt;/code&gt; header.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"Feature-Policy": "accelerometer 'none'; ambient-light-sensor 'none'; autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'self'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none';  picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; vr 'none';"
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;h2&gt;
  
  
  Integrating third-party scripts
&lt;/h2&gt;

&lt;p&gt;You may notice while using the bootstrap CDN with an &lt;em&gt;integrity&lt;/em&gt; attribute.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What the heck is that?&lt;/strong&gt;&lt;br&gt;
Subresource Integrity(SRI) which is a security feature that enables browsers to verify that resources they fetch (for example, from a &lt;a href="https://developer.mozilla.org/en-US/docs/Glossary/CDN"&gt;CDN&lt;/a&gt;) are delivered without unexpected manipulation.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css" integrity="sha384-9aIt2nRpC12Uk9gS9baDl411NQApFmC26EwAOH8WgZl5MYYxFfc+NcPb1dKGj7Sk" crossorigin="anonymous"&amp;gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;Imagine you are including a third-party script in your application. &lt;br&gt;
&lt;strong&gt;What if they serve different content that attacks your application instead of actual content?&lt;/strong&gt;&lt;br&gt;
The eventuality that is possible.&lt;/p&gt;

&lt;p&gt;The good news is we can prevent using Subresource Integrity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What if your third-party provider doesn't provide the SRI?&lt;/strong&gt;&lt;br&gt;
 Still, you can generate Integrity by using &lt;a href="https://www.srihash.org/"&gt;srihash.org&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Dependencies
&lt;/h2&gt;

&lt;p&gt;If you look into the &lt;code&gt;node_modules&lt;/code&gt;, you see a lot of folders. And you might think is this needed?&lt;br&gt;
Yes, those are needed that's why they are in your project folder.&lt;/p&gt;

&lt;p&gt;But the question is, how many dependencies have security vulnerabilities?&lt;br&gt;
We can easily find add run command &lt;code&gt;npm audit&lt;/code&gt; &lt;/p&gt;

&lt;p&gt;Every day a lot of vulnerability is exposed that might affect one your dependencies, We can monitor our dependence's vulnerabilities tool using various tools.&lt;/p&gt;

&lt;p&gt;The tools like &lt;a href="https://dependabot.com/"&gt;Dependabot&lt;/a&gt; and &lt;a href="https://snyk.io/"&gt;Snyk&lt;/a&gt; constantly monitor the vulnerabilities of Dependencies and create a pull request when the vulnerability fixed.&lt;/p&gt;

&lt;h2&gt;
  
  
  Iframe
&lt;/h2&gt;

&lt;p&gt;An iframe is used full thing to display your application content to another application or vice versa.&lt;br&gt;
But the iframe  from the cross-domain &lt;strong&gt;can&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Autoplay videos&lt;/li&gt;
&lt;li&gt;Display Forms&lt;/li&gt;
&lt;li&gt;Triggers Alert&lt;/li&gt;
&lt;li&gt;Run plugins – including malicious ones&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We can prevent by adding &lt;code&gt;X-Frame-Options&lt;/code&gt; header&lt;/p&gt;

&lt;h2&gt;
  
  
  Autofill
&lt;/h2&gt;

&lt;p&gt;Autofill is the super useful feature for the user, but it might lead to &lt;strong&gt;Sensitive data exposure&lt;/strong&gt;.&lt;br&gt;
Always be careful before adding the &lt;code&gt;autofill="true"&lt;/code&gt; attribute.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;br&gt;
&lt;br&gt;&lt;br&gt;
Thanks for reading. &lt;/p&gt;

&lt;p&gt;👇 Leave a comment 👇&lt;br&gt;
If you have any question or suggestion. &lt;/p&gt;

&lt;p&gt;Leave a ♥️ &amp;amp; 🦄. For more interesting content also check out my &lt;a href="https://twitter.com/NaveenDA_"&gt;Twitter&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>frontend</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
