200 Hacker News submissions for Snyk

HN Points HN Title (Links to submission) Submitted Date
562 The most popular docker images each contain at least 30 vulnerabilities 2019-02-26
312 NPM package compromised by author: erases files on RU / BY computers on install 2022-03-16
282 The MongoDB hack and the importance of secure defaults 2017-01-11
259 NPM lockfiles can be a security blindspot for injecting malicious modules in PRs 2019-12-26
215 Open source maintainer pulls the plug on NPM packages colors and faker 2022-01-09
192 Kotlin becomes second most popular language on the JVM 2020-02-06
189 Abusing Ubuntu 24.04 features for root privilege escalation 2024-11-13
170 The Frequency of Known Vulnerabilities in JavaScript 2017-03-09
147 Malicious remote code execution backdoor discovered bootstrap-sass Ruby gem 2019-04-04
139 HTTPS Adoption doubled this year 2016-07-22
114 Serverless security implications from infra to OWASP 2017-04-19
108 Looking at how many sites use vulnerable JavaScript libraries 2017-11-22
103 Building a backdoor with Node.js 2020-03-19
102 SourMint Malicious SDK 2020-08-25
98 How to crash an email server with a single email (2018) 2020-05-07
94 Zip Slip Vulnerability 2018-06-05
88 XSS Attacks: The Next Wave 2017-06-08
86 Show HN: Vuln Cost – immersive VS Code extension to surface vulnerabilities 2020-04-05
53 Snyk introduces security monitoring for serverless applications 2017-04-26
41 "Leaky Vessels" Docker Container Breakout Vulnerability 2024-01-31
38 Snyk.io – Find and fix known vulnerabilities in Node.js dependencies 2015-12-27
34 Understand filesystem takeover vulnerabilities in NPM JavaScript package manager 2020-01-07
20 The 2017 State of Open Source Security from Snyk 2017-11-16
19 Log4Shell Remediation Cheat Sheet 2021-12-16
18 Snyk lays off 30 people 2022-07-04
17 Two most popular Docker base images each have over 500 vulnerabilities 2019-04-18
17 Top 50 breaches data challenges the OWASP Top 10 2017-05-10
17 Yarn is Micro Secure 2016-10-25
13 77% of sites use at least one vulnerable JavaScript library 2017-03-29
12 Equifax compromised via OSS library – who owns this, and how to defend yourself 2017-09-11
11 88% increase in application library vulnerabilities over two years 2019-02-26
11 Top ten Docker images contain over 8000 vulnerable paths 2019-03-11
11 HTTPS Adoption has *more than doubled* this year 2016-07-20
10 SourMint: Malicious code, ad fraud, and data leak in iOS 2020-08-24
10 Snyk discovers prototype pollution security vulnerabilities affecting lodash 2019-07-04
9 JavaScript type confusion: Bypassed input validation 2021-11-03
8 Regular Expression Denial of Service and Catastrophic Backtracking 2017-01-18
8 Type Manipulation: Escaping Template Sandboxes 2017-03-21
8 The 5 dimensions of an npm dependency 2016-06-16
7 Snyk Closes $150M to Accelerate Developer-First Security 2020-01-21
7 State of Open Source Security Survey – Need Your Input 2017-09-24
7 Mitigating ImageMagick vulnerabilities in Node.js 2016-05-06
6 Secure JavaScript URL Validation 2022-10-22
6 77% of Sites Use at Least One Vulnerable JavaScript Library 2017-03-30
6 How not to publish malicious npm packages 2016-03-29
5 Node.js release fixes a critical HTTP security vulnerability 2020-02-06
5 JVM Ecosystem Report 2018 – biggest ever JVM survey 2018-10-17
5 Best practices for managing Java dependencies 2022-08-30
5 npm passes the 1 Millionth package milestone! 2019-06-04
5 Bitbucket Security Best Practices 2019-04-12
5 Python Security Best Practices Cheat Sheet 2019-03-02
5 Snyk's Style Guide: How we built it, and how we use it every day 2016-07-13
4 Cheatsheet: Top Application Security Acronyms 2020-12-01
4 Escaping from Docker one syscall at a time 2024-02-08
4 Containerizing .NET Apps? 2022-10-03
4 Kubernetes container isolation impacts privilege escalation attacks 2020-12-03
4 Using Node.js Event Loop for Timing Attacks (2016) 2020-01-14
4 2019 side-by-side comparison of Angular and React security vulnerabilities 2019-10-30
4 Code execution back door found in Ruby’s rest-client library 2019-08-21
4 75% of the top twenty known .NET vulnerabilities have a high severity rating 2019-07-25
4 Ruby gem strong_password found to contain remote code execution code 2019-07-07
4 Malicious code found in NPM event-stream downloaded 8M times in 2 months 2018-11-26
4 Differences in version handling between RubyGems and npm 2016-12-15
4 Exploiting buffer 2016-04-06
4 Using Node.js Event Loop for Timing Attacks 2016-02-22
3 NPM Security Best Practices 2019-03-14
3 Snyk Open Source Advisor – Snyk 2021-08-01
3 Runc process.cwd and leaked fds container breakout (CVE-2024-21626) 2024-02-01
3 How to Keep HTTP Connections Alive for 9 Hours 2023-10-24
3 Using Kubernetes Config Maps 2022-10-03
3 Argument Injection in Git and Mercurial 2022-09-30
3 Snyk finds 200 malicious packages and Cobalt Strike dependency confusion trojan 2022-05-25
3 Node.js Event-Loop: How even quick Node.js async functions can block Event-Loop 2021-11-30
3 Java logging: what should you log and what not? 2020-11-17
3 Demystifying HTTP Request Smuggling 2020-07-29
3 Yarn 2 – the future of package managers for JavaScript? 2020-04-06
3 Using UBI images to minimize container vulnerabilities 2020-04-03
3 Cloud transforms IT security into AppSec 2020-03-15
3 Apache License 2.0, MIT or BSD – License Comparison – Snyk 2020-03-09
3 Security breach leaks the personal data of all 6.5M Israeli voters 2020-02-12
3 36% of developers switched from Oracle JDK to an alternate OpenJDK distribution 2020-02-07
3 Malicious packages found to be typo-squatting in Python Package Index 2019-12-05
3 Angular vs. React: the security risk of indirect dependencies 2019-11-11
3 A year-old malicious remote code execution vulnerability discovered in Webmin 2019-08-20
3 10 Eclipse plugins you shouldn’t code without 2019-08-20
3 After 3 years of silence, a new jQuery prototype pollution vulnerability emerges 2019-04-17
3 250k new modules on NPM in 2018, growing 37% and 317B downloads a year 2019-03-04
3 GitHub Security Cheatsheet 2018-05-31
3 Local Type Inference Cheat Sheet for Java 10 and Beyond 2018-04-28
2 Lottie Player NPM package compromised 2024-10-31
2 Modern Node.js Runtime Features 2024-06-30
2 .NET developers alert: Moq NuGET package exfiltrates user emails from Git 2023-08-13
2 How secure is WebAssembly? 5 security concerns unique to WebAssembly 2023-08-09
2 Data Loss Prevention for Developers 2023-05-25
2 Security implications of HTTP response headers 2023-05-18
2 Comparing Node.js web frameworks: Which is most secure? 2023-03-21
2 Mitigating path traversal vulns in Java with Snyk Code 2023-03-15
2 Node.js multithreading with worker threads: pros and cons 2023-03-09
2 How to write your first unit test in JavaScript 2022-11-01
2 New OpenSSL 3 critical vulnerability 2022-11-01
2 Quick Linting Checks in Python 2022-10-18
2 Choosing the best Node.js Docker image 2022-10-10
2 Phony PyPI package imitates known developer 2022-10-05
2 Testing Effectively in Terraform 2022-09-29
2 Best practices for creating a modern NPM package 2022-09-13
2 Continuous dependency updates: Improving processes by front-loading pain (2021) 2022-08-01
2 State of Open Source Security 2022 2022-06-22
2 Celebrating open source innovation from Ukraine 2022-03-23
2 Security in context: When is a CVE not a CVE? 2021-12-17
2 Detect and prevent dependency confusion attacks on NPM 2021-09-29
2 JVM Ecosystem Report 2021 2021-06-24
2 VSCode Extensions Vulnerabilities 2021-06-07
2 Snyk takes on responsibility for Node.js vulnerability disclosure program 2021-05-27
2 Kubernetes Security Context settings you should understand 2021-03-29
2 Command injection: how it works, what are the risks, and how to prevent it 2020-12-15
2 React Security Best Practices 2020-11-16
2 Privileged Docker containers–do you need them? 2020-11-05
2 Angular Security Best Practices 2020-08-21
2 Test website security with Snyk’s newest WebPageTest integration 2020-05-14
2 Why did is-promise happen and what can we learn from it 2020-04-28
2 AngularJS Security Fundamentals 2020-03-19
2 Comparing React and Angular secure coding practices 2019 2019-11-13
2 Snyk Container: find and fix vulnerabilities in containers and k8s applications 2019-11-13
2 JavaScript frameworks security report 2019 2019-11-12
2 10 Java Security Best Practices 2019-09-17
2 Kubernetes open sourced their security audit. What can we learn? 2019-08-08
2 Kuberentes open sourced their security audit. What can we learn? 2019-08-08
2 CRLF injection found in popular Python dependency 2019-05-15
2 A Denial of Service Vulnerability in Axios JavaScript HTTP Client 2019-05-07
2 80% of developers are not addressing Docker security 2019-04-29
2 So, you think your CI/CD environment is secure? 2019-02-25
2 NPM Security Best Practices 2019-02-19
2 Severe Security Vulnerability in Bower’s Zip Archive Extraction 2019-01-31
2 Another popular NPM library is identified using malicious package 2018-11-27
2 Snyk Launches Support for Gradle, Scala and Python 2017-08-03
2 Fix and prevent known vulnerabilities in Node.js and Ruby apps 2017-03-30
2 Using ES2015 Proxy for fun and profit 2016-08-25
2 Socket.io client disables the core SSL/TLS verification checks by default 2016-06-02
2 Fixing the XSS vulnerability in the marked Markdown parser 2016-05-20
1 Snyk Acquires Developer-First DAST Provider Probely 2024-11-13
1 How to make a mock API server in JavaScript 2022-10-20
1 Cache poisoning in popular open source packages CVE-2021-23336 2021-02-16
1 Sequelize ORM NPM library found vulnerable to SQL Injection attacks 2019-09-11
1 Understanding command injection vulnerabilities in Go 2024-11-15
1 Can machines dream of secure code? From AI hallucinations to vulnerabilities 2023-08-20
1 Cross-site leaks (XS leaks): What they are and how to avoid them 2023-08-16
1 Session management security: Best practices for protecting user sessions 2023-08-14
1 How to Dockerize a PHP application securely 2023-08-09
1 Sandbox Bypass Affecting org.thymeleaf:thymeleaf 2023-08-03
1 Snyk top code vulnerabilities report 2023-05-19
1 Gitpod remote code execution 0-day vulnerability via WebSockets 2023-03-02
1 The Big Fix: 2023 (Secure All Software) 2023-02-14
1 NPM security: preventing supply chain attacks 2022-11-24
1 Container Images Simplified with Ko 2022-10-18
1 SMTP Injection 2022-10-11
1 Supply chains security as per Executive Order M-21-30 2022-10-10
1 Breaking Down Security Roles 2022-10-10
1 CSRF vulnerability in NPM package csurf 2022-09-21
1 Building a Secure Node.js API with gRPC 2022-08-31
1 A definitive guide to Ruby gems dependency management 2022-08-09
1 Tips for C++ Security 2022-08-01
1 Snyk Lauches the Big Fix: Fix Vulnerabilities, Get a Shirt 2022-01-25
1 Maintainer pulls the plug on NPM packages colors and faker, now what? 2022-01-14
1 URL confusion vulnerabilities in the wild: Exploring parser inconsistencies 2022-01-11
1 VS Code Extension Vulnerabilities 2021-05-27
1 Snyk Code is now available for free 2021-05-20
1 How to prevent code injection in JavaScript and Node.js 2021-04-07
1 Typosquatting attacks are responsible for malicious modules in NPM 2021-01-12
1 Helping Python developers shift security left with a new PyCharm plugin 2020-09-12
1 Reachable vulnerabilities: how to effectively prioritize open source security 2020-08-19
1 The State of Open Source Security 2020 2020-06-25
1 Checking Helm Charts for security misconfigurations 2020-06-14
1 Vulnerability DB: Information and remediation for known vulnerabilities 2020-05-25
1 Java turns 25–aging like fine wine or more like milk? 2020-05-22
1 Snyk’s developer-first license compliance management 2020-04-26
1 Prototype pollution vulnerability in minimist NPM package 2020-03-26
1 Fastify Node.js framework improves JSON security thanks to security report 2020-03-16
1 Ghostcat breach affects all Tomcat versions 2020-02-26
1 A Snyk peek into Node.js and NPM’s state of open source security report 2019 2019-10-09
1 Everything you wanted to know about security vulnerabilities in Linux-based 2019-09-18
1 Jackson Deserialization Vulnerability 2019-08-26
1 What about the security of my AWS Lambda functions and their dependencies 2019-07-10
1 Scoring Security Vulnerabilities 101: Introducing CVSS for CVEs 2019-05-16
1 190k users affected by Docker Hub's security breach. Now what? 2019-04-30
1 How much do we know about how packages behave on the NPM registry? 2019-04-23
1 Take actions to improve security in your Docker images 2019-04-19
1 Docker Image Security Best Practices 2019-04-08
1 Malicious remote code execution backdoor discovered in bootstrap-sass Ruby gem 2019-04-04
1 Experimental Integrity Policies to Node.js 2019-04-01
1 ReDoS vulnerabilities in NPM spikes by 143% and XSS continues to grow 2019-02-27
1 Directory Traversal Affecting org.apache.tomcat:tomcat-catalina 2018-06-23
1 Deserialization of Untrusted Data Affecting Com.Google.guava:guava, [,24.1.1) 2018-06-23
1 Arbitrary Code Execution Affecting com.h2database:h2, versions [,1.4.197) 2018-06-23
1 Attacking an FTP Client: MGETting more than you bargained for 2018-04-04
1 We'll know DevSecOps has won once it's dead 2018-01-31
1 Npm deprecated all malicious typosquatting libraries from this list 2017-08-02
1 Understanding Responsible Disclosures 2017-01-31
1 Fixing Serverless Security Vulnerabilities 2016-10-24
1 The security concerns of a JavaScript sandbox with the Node.js VM module 2024-12-22
3 Snyk Security Labs Testing Update: Cursor.com AI Code Editor 2025-01-14