From the course: Secure Coding in Java

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Build vulnerabilities

Build vulnerabilities - Java Tutorial

From the course: Secure Coding in Java

Start my 1-month free trial

Build vulnerabilities

- We have a few additional topics to discuss, the first of which is going to be our build system. This is the last location that many developers have control of where security issues can be injected into an application. The build process itself has several areas we can focus on as developers. First and foremost is the dependencies being used for application. Now we can write the most secure code in the world, any vulnerable dependency can spoil the entire party. mitigating this risk is actually a two phase process. First, you should run a dependency checking plugin, and process that uses a database to evaluate if there are known CVE's in a given dependency. Or worse, for instance, produces one such plugin for free, though there may be better ones out there that you may have to pay for. Now, the second part of this process is to actually fix what the data comes up with. So if it tells you that you have a dependency that has…

Contents