Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aNlRCNC4_Jys33iA@yuggoth.org>
Date: Sun, 28 Sep 2025 15:15:20 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: Re: How to do secure coding and create secure software

On 2025-09-28 09:05:15 +0530 (+0530), Amit wrote:
[...]
> But still, the main point is that can someone give an example of how a 
> software made up of all secure functions be hacked? I request for an 
> example (not theoretical statements).
>
> Or, some example that happened in the past in the real world? I will 
> analyze that.
[...]

As an aside, the term "hack" has a lot of other less nefarious 
meanings, and using it to describe unwanted or criminal activity 
casts the entire hacker community in a negative light.

I think you still have tunnel vision, imagining that "hacking" 
software can only mean attacking flaws in the way it was coded. When 
I say most of the security flaws I deal with stem from poor design 
choices rather than insecure coding practices, I really mean it. I'm 
one of the vulnerability managers for the OpenStack project, and 
skimming over all the recent entries at the top of 
https://security.openstack.org/ossalist.html they basically all fit 
that description.

It's comparatively easy to avoid or catch insecure coding patterns 
that could lead to vulnerabilities, it's much harder to design 
complex software securely.
-- 
Jeremy Stanley

Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.