![]() |
|
Message-ID: <2adc239e81a272808e42f4be59479343@herricane.ca> Date: Sun, 28 Sep 2025 11:39:23 -0400 From: Katie <katie@...ricane.ca> To: oss-security@...ts.openwall.com Subject: Re: How to do secure coding and create secure software "the term "hack" has a lot of other less nefarious meanings, and using it to describe unwanted or criminal activity casts the entire hacker community in a negative light." Just want to add my support for this important statement. Thanks for saying stating this so well Jeremy! -Katie On 2025-09-28 11:15, Jeremy Stanley wrote: > On 2025-09-28 09:05:15 +0530 (+0530), Amit wrote: > [...] >> But still, the main point is that can someone give an example of how a >> software made up of all secure functions be hacked? I request for an >> example (not theoretical statements). >> >> Or, some example that happened in the past in the real world? I will >> analyze that. > [...] > > As an aside, the term "hack" has a lot of other less nefarious > meanings, and using it to describe unwanted or criminal activity casts > the entire hacker community in a negative light. > > I think you still have tunnel vision, imagining that "hacking" software > can only mean attacking flaws in the way it was coded. When I say most > of the security flaws I deal with stem from poor design choices rather > than insecure coding practices, I really mean it. I'm one of the > vulnerability managers for the OpenStack project, and skimming over all > the recent entries at the top of > https://security.openstack.org/ossalist.html they basically all fit > that description. > > It's comparatively easy to avoid or catch insecure coding patterns that > could lead to vulnerabilities, it's much harder to design complex > software securely.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.