Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't put much stock in this "9.6" stuff; CVSS is a ouija board that will say whatever people want it to say. But regardless: the best security teams in the world still see critical vulnerabilities in their software, because software is all garbage.


I've recently stopped two design choices in external facing resources that posed significant security risks.

One of which was around credentials resetting to emails that aren't stored in the API auth system itself, but rather come into Salesforce as a support case. "Don't worry, a support team member has to action the request" was meant to be reassuring, until I explained that this translated to "the only mechanism in place to prevent credentials being stolen comes with a massive social engineering vulnerability".

But it's the previous choices I haven't come across yet that worry me.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: