![]() |
|
Message-ID: <aNlRCNC4_Jys33iA@yuggoth.org>
Date: Sun, 28 Sep 2025 15:15:20 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: Re: How to do secure coding and create secure software
On 2025-09-28 09:05:15 +0530 (+0530), Amit wrote:
[...]
> But still, the main point is that can someone give an example of how a
> software made up of all secure functions be hacked? I request for an
> example (not theoretical statements).
>
> Or, some example that happened in the past in the real world? I will
> analyze that.
[...]
As an aside, the term "hack" has a lot of other less nefarious
meanings, and using it to describe unwanted or criminal activity
casts the entire hacker community in a negative light.
I think you still have tunnel vision, imagining that "hacking"
software can only mean attacking flaws in the way it was coded. When
I say most of the security flaws I deal with stem from poor design
choices rather than insecure coding practices, I really mean it. I'm
one of the vulnerability managers for the OpenStack project, and
skimming over all the recent entries at the top of
https://security.openstack.org/ossalist.html they basically all fit
that description.
It's comparatively easy to avoid or catch insecure coding patterns
that could lead to vulnerabilities, it's much harder to design
complex software securely.
--
Jeremy Stanley
Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.