Web-app security risks demonstrated

This page summarizes the projects mentioned and recommended in the original post on dev.to

Judoscale - Save 47% on cloud hosting with autoscaling that just works
Judoscale integrates with Rails, Sidekiq, Solid Queue, and more to make autoscaling easy and reliable. Save big, and say goodbye to request timeouts and backed-up job queues.
judoscale.com
featured
CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
  1. security-risks-demo

    The OWASP (Open Web Application Security Project) Community launches a list of the top 10 biggest internet security-risks every year. This post will cover them and also give a demonstration to each one. All the code for the demonstrations is open source. Feel free to fork and add your own demonstrations!

  2. Judoscale

    Save 47% on cloud hosting with autoscaling that just works. Judoscale integrates with Rails, Sidekiq, Solid Queue, and more to make autoscaling easy and reliable. Save big, and say goodbye to request timeouts and backed-up job queues.

    Judoscale logo
  3. CanCanCan

    The authorization Gem for Ruby on Rails.

    In production code you would most likely use a library for access control, such as CanCanCan

  4. rails-bruter.py

    This vulnerability is concerned with flaws in the login and session handling process, such as allowing brute force or other automated attacks, allowing weak passwords, knowledge based answers for password revocery or exposure of the session identifier in the URL. For our demonstration we want to brute force an account on /insecure-login. The brute force code is on (GitHub)[https://github.com/aneshodza/rails-bruter.py]. If we execute it will open an instance of the browser and try to brute force the password. When it finds the correct password it writes that into passwords.txt. This should be prevented by someone that is trying to create a web-app, by, for example, limiting the amount of login tries a person can do or implementing a captcha.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Feature flags in Rails: How to roll out and manage your features like a pro

    2 projects | dev.to | 7 Apr 2023
  • How would you store roles with up to 64 permissions?

    2 projects | /r/rails | 9 Mar 2023
  • Protect your GraphQL data with resource_policy

    3 projects | dev.to | 20 Feb 2023
  • YAGNI exceptions

    3 projects | /r/programming | 17 Oct 2022
  • Best practice for displaying info to different user roles?

    3 projects | /r/rails | 4 Oct 2022

Did you know that Ruby is
the 12th most popular programming language
based on number of references?