mackowski Profile
mackowski

@kubamackowski

Followers
188
Following
278
Media
1
Statuses
121

I help developers write secure code. | co-leader of OWASP Cheat Sheet Series project. | Application Security Engineer

Joined December 2019
Don't wanna be here? Send us removal request.
@WisecWisec
Stefano Di Paola
5 years
OH: to SAST Tools. When dealing with "OWASP Top 10 A9 Using Components with Known Vulnerabilities" please, unless you have a POC, do not set the risk as "absolute" value. 1/3
2
2
6
@GHSecurityLab
GitHub Security Lab
3 years
Catch the replay of @xcorail's talk about #CodeQL at #CNSCon! To shift security left, empower your developers with the Security as Code approach.
0
15
18
@kkotowicz
koto
3 years
@WeldPond @manicode Reachability is not exploitabiity. And even if we consider technically reachable, exploitable data flows, the security impact is encoded in the threat model, not code (is it in internal tool? Is the functionality only exposed to admin roles? Would anyone benefit from exploiting?)
1
2
4
@semgrep
Semgrep
3 years
☕ Java XML security can be quite a mess. 🧘 Sit down with our security researchers Pieter and Vasilii as they untangle XML security options across different XML parsers. 📓
0
4
12
@manicode
Jim Manico from Manicode Security
3 years
As AppSec testing capabilities mature in our industry, intricate details and capabilities of various AppSec tools matter. Like does your SCA tool understand if the lib is exploitable or not? And I find that pros out there that understand this level of detail are rare.
12
6
48
@OWASPTop10
OWASP Top10
3 years
Let's get the many OWASP Top 10's going again! If you are interested in contributing to any of the various OWASP Top 10's or Proactive Controls, please RSVP to one of these: Option 1 https://t.co/y8uxN5UOxM Option 2 https://t.co/A7YDIkem4N Option 3
meetup.com
Let's kick off the Top 10 reboots - Mobile, Top 10, proactive Controls, data collection and more.
0
13
18
@clintgibler
Clint Gibler
3 years
🤬 XML Security in Java Turns out, it's crazy! Varying mitigations, security features that don't work as documented, and more @0xDC0DE and @ermil0v give probably the most through treatment of Java XML security I've seen https://t.co/hMTBzrky5w
Tweet media one
2
33
90
@kkotowicz
koto
3 years
We're launching a new VRP for Google's open source software, specifically focused on supply chain issues and build compromises. https://t.co/1j8X5MrRyh (this time with a proper link!)
Tweet card summary image
security.googleblog.com
Posted by Francis Perron, Open Source Security Technical Program Manager, and Krzysztof Kotowicz, Information Security Engineer  Today, we a...
0
28
95
@Jhaddix
JS0N Haddix
3 years
a🧵 ⚠️Orgs with mature security programs⚠️ Want a masterclass in scoping/running a bug bounty program? Read more from a program owner, (former) bounty platform employee, and top bug hunter (me😂) 🚨 Retweet, follow, & like for more sec content! 🚨 1/x
4
72
224
@commjoenie
Jeroen
3 years
Who would be interested in building and publishing git-secrets and truffle hog rules based on #OWASP #WrongSecrets? (Asking for a volunteer)
2
4
6
@kubamackowski
mackowski
3 years
Thank you @left4deaf for adding Relationship-Based Access Control (ReBAC) to the Authorization cheatsheet! https://t.co/2eT0zqRoCN #AppSec #OWASP #owaspcheatsheetseries @owasp @manicode
0
0
3
@dzikoysk
dzikoysk
4 years
(1/5) If you're using log4j library, you should bump it as soon as possible to 2.15+. Dangerous RCE has been spotted a few days ago and it can be used by literally ANY user just by logging an incoming data in some way. You should probably notify people you know about it #Java
3
185
379
@Scott_Helme
Scott Helme
4 years
Sometimes you get to scratch an itch and take something off your backlog that's been bugging you! We're now using CSP nonces in an enforced policy over at @reporturi 😎
scotthelme.co.uk
Hurrah! Sometimes it takes a little while for projects to make it through your backlog and into production, but the nonce-based policy for CSP on Report URI can now be crossed off the list! Content...
1
7
21
@kubamackowski
mackowski
4 years
I highly recommend check out this new @owasp project https://t.co/b3QEaEVEsM Kudos for @bendehaan @commjoenie for creating this! #appsec #owasp
0
1
5
@manicode
Jim Manico from Manicode Security
4 years
https://t.co/mKj5gxf55R looks like a solid list of breached passwords we plan to add as a open source reference to one of the ASVS sections. Are there other lists we should reference?
Tweet card summary image
ncsc.gov.uk
The contents were out of date or replaced, but you can still access the information via The National Archives website. Details how to do this below.
1
1
8
@manicode
Jim Manico from Manicode Security
4 years
I’m having difficulty making a call for a cheatsheet regarding guidance to HMAC a password before sending it over TLS. Please chime in here if interested and have expertise in this area https://t.co/dXVN4G5hsK.
github.com
What is the proposed Cheat Sheet about? HMAC can be used in a way that allows users to login with a password but never actually transmit the password to the server during login. When you consider t...
10
4
9
@thebinarybot
Nithin 🦹‍♂️
4 years
Bypass SSRF protection with different encodings. A thread. 🧵👇
14
291
700