<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>SecureStack</title><description>Application Security for Developers</description><link>https://securestack.pages.dev/</link><language>en-us</language><item><title>SQL Injection Prevention: A Complete Developer Guide</title><link>https://securestack.pages.dev/articles/sql-injection-prevention-guide/</link><guid isPermaLink="true">https://securestack.pages.dev/articles/sql-injection-prevention-guide/</guid><description>Parameterised queries, ORM pitfalls, and blind SQLi detection patterns to protect your application data.</description><pubDate>Sat, 10 May 2025 00:00:00 GMT</pubDate><category>sql-injection</category><category>database</category><category>owasp</category><category>security</category></item><item><title>Secrets Management: The Twelve-Factor Approach and Beyond</title><link>https://securestack.pages.dev/articles/secrets-management-twelve-factor/</link><guid isPermaLink="true">https://securestack.pages.dev/articles/secrets-management-twelve-factor/</guid><description>How secrets end up in git history, why environment variables aren&apos;t enough, and how to use Vault and AWS Secrets Manager properly.</description><pubDate>Thu, 08 May 2025 00:00:00 GMT</pubDate><category>secrets</category><category>environment-variables</category><category>vault</category><category>aws</category><category>twelve-factor</category></item><item><title>JWT Security: Common Mistakes That Lead to Authentication Bypass</title><link>https://securestack.pages.dev/articles/jwt-security-common-mistakes/</link><guid isPermaLink="true">https://securestack.pages.dev/articles/jwt-security-common-mistakes/</guid><description>The alg:none attack, weak secrets, JWKS spoofing, and how to validate JWTs correctly in Node and Python.</description><pubDate>Tue, 06 May 2025 00:00:00 GMT</pubDate><category>jwt</category><category>authentication</category><category>tokens</category><category>owasp</category></item><item><title>Dependency Confusion and Supply Chain Attacks: Protecting Your Build Pipeline</title><link>https://securestack.pages.dev/articles/dependency-confusion-supply-chain/</link><guid isPermaLink="true">https://securestack.pages.dev/articles/dependency-confusion-supply-chain/</guid><description>How dependency confusion attacks work against npm and pip, and how to configure private registries to block them.</description><pubDate>Sun, 04 May 2025 00:00:00 GMT</pubDate><category>supply-chain</category><category>dependencies</category><category>npm</category><category>pip</category><category>registry</category></item><item><title>Insecure Deserialization: Java Gadget Chains, Python Pickle, and Safe Alternatives</title><link>https://securestack.pages.dev/articles/secure-deserialization-java-python/</link><guid isPermaLink="true">https://securestack.pages.dev/articles/secure-deserialization-java-python/</guid><description>How insecure deserialization leads to remote code execution in Java and Python, and the safe alternatives for each.</description><pubDate>Fri, 02 May 2025 00:00:00 GMT</pubDate><category>deserialization</category><category>java</category><category>python</category><category>rce</category><category>owasp</category></item><item><title>OWASP Top 10 2025: A Practical Developer Checklist</title><link>https://securestack.pages.dev/articles/owasp-top-10-2025-developer-guide/</link><guid isPermaLink="true">https://securestack.pages.dev/articles/owasp-top-10-2025-developer-guide/</guid><description>The updated OWASP Top 10 for 2025, with code-level examples and actionable checklists for each category.</description><pubDate>Thu, 01 May 2025 00:00:00 GMT</pubDate><category>owasp</category><category>checklist</category><category>security</category><category>web-security</category></item></channel></rss>