Forem

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Writing Custom SAST Rules for Vulnerabilities Your Scanner Doesn't Cover

Writing Custom SAST Rules for Vulnerabilities Your Scanner Doesn't Cover

Comments
8 min read
How I Modelled the OWASP Top 10 Into a YAML Rule Engine

How I Modelled the OWASP Top 10 Into a YAML Rule Engine

Comments
8 min read
Best Snyk Alternatives in 2026: Which AppSec Tool Should You Choose?
Cover image for Best Snyk Alternatives in 2026: Which AppSec Tool Should You Choose?

Best Snyk Alternatives in 2026: Which AppSec Tool Should You Choose?

2
Comments 1
12 min read
SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top
Cover image for SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

Comments
10 min read
From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement
Cover image for From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement

From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement

Comments
13 min read
60–80% of your CVEs are unreachable. Here's how to prove it.
Cover image for 60–80% of your CVEs are unreachable. Here's how to prove it.

60–80% of your CVEs are unreachable. Here's how to prove it.

1
Comments
4 min read
What AppSec Engineers Actually Do (and Why It Matters)

What AppSec Engineers Actually Do (and Why It Matters)

Comments
7 min read
If Your Security Scanner Can't See Attack Chains, You're Flying Blind

If Your Security Scanner Can't See Attack Chains, You're Flying Blind

Comments
5 min read
What Government Data Breaches Teach Us About Access Control
Cover image for What Government Data Breaches Teach Us About Access Control

What Government Data Breaches Teach Us About Access Control

Comments
5 min read
Secure System Design -- 14 Challenges

Secure System Design -- 14 Challenges

Comments
31 min read
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners

From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners

Comments
3 min read
Are You Still Checking Binary Hardening by Hand? I Built bincheck in Rust
Cover image for Are You Still Checking Binary Hardening by Hand? I Built bincheck in Rust

Are You Still Checking Binary Hardening by Hand? I Built bincheck in Rust

Comments
2 min read
Execute First, Ask Never: A Vulnerability in snyk-agent-scan
Cover image for Execute First, Ask Never: A Vulnerability in snyk-agent-scan

Execute First, Ask Never: A Vulnerability in snyk-agent-scan

2
Comments
8 min read
From Alert Lists to Exploit Graphs: How Auditor Core Changes the Security Calculus

From Alert Lists to Exploit Graphs: How Auditor Core Changes the Security Calculus

Comments
5 min read
Subdomain Takeover is Not Just Phishing: How Acronis Nearly Lost Authenticated API Access

Subdomain Takeover is Not Just Phishing: How Acronis Nearly Lost Authenticated API Access

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.