Skip to content

Commit 6cd34cb

Browse files
Fix a couple of typos, an incomplete sentence, and some invalid code (#58)
1 parent bf64524 commit 6cd34cb

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

modules/2-owasp.livemd

+2-2
Original file line numberDiff line numberDiff line change
@@ -291,7 +291,7 @@ Notable CWEs included are CWE-297: Improper Validation of Certificate with Host
291291
* Limit or increasingly delay failed login attempts.
292292
* Log all failures and alert the Security team when credential stuffing, brute force, or other attacks are detected.
293293
* Use a server-side, secure, built-in session manager that generates a new random session ID with high entropy after login.
294-
* Session identifier should not be in the URL, be securely stored, and invalidated after logout, idle,
294+
* Session identifier should not be in the URL, be securely stored, and invalidated after logout, idle, and absolute timeouts.
295295

296296
<!-- livebook:{"branch_parent_index":3} -->
297297

@@ -345,7 +345,7 @@ Notable CWES include CWE-778 Insufficient Logging to include CWE-117 Improper Ou
345345

346346
Server-Side Request Forgery (SSRF) flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL).
347347

348-
This is determental since these flaws could be leveraged as part of a botnet or even to further exploit other services in your network that are only accessible in a Service-to-Service context (e.g. not available to public internet, but only to services in the same VPC).
348+
This is detrimental since these flaws could be leveraged as part of a botnet or even to further exploit other services in your network that are only accessible in a Service-to-Service context (e.g. not available to public internet, but only to services in the same VPC).
349349

350350
### Prevention
351351

modules/4-graphql.livemd

+4-4
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ _Uncomment the item number (1-4) with your answer_
9292

9393
```elixir
9494
# -------------------------------------------------------------
95-
# answer = :1
95+
# answer = 1
9696
#
9797
# HTTP/2 401 Unauthorized
9898
# Date: Tues, 16 Aug 2022 21:06:42 GMT
@@ -101,7 +101,7 @@ _Uncomment the item number (1-4) with your answer_
101101
# “error”:”token expired”
102102
# {
103103
# -------------------------------------------------------------
104-
# answer = :2
104+
# answer = 2
105105
#
106106
# HTTP/2 200 OK
107107
# Date: Tues, 16 Aug 2021 22:06:42 GMT
@@ -120,7 +120,7 @@ _Uncomment the item number (1-4) with your answer_
120120
# ]
121121
# }
122122
# --------------------------------------------------------------
123-
# answer = :3
123+
# answer = 3
124124
#
125125
# HTTP/2 200 OK
126126
# Date: Tues, 16 Aug 2022 21:06:42 GMT
@@ -129,7 +129,7 @@ _Uncomment the item number (1-4) with your answer_
129129
# “error”:”ID token for user 55e4cb07 at org 1234 expired”
130130
# {
131131
# ---------------------------------------------------------------
132-
# answer = :4
132+
# answer = 4
133133
#
134134
# HTTP/2 404 File Not Found
135135
# Date: Tues, 16 Aug 2022 21:06:42 GMT

modules/9-secure-road.livemd

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ With all that in mind, in this final module let's explore some examples of Data
3535

3636
In a microservice architecture, it is common for backend services to need to communicate with one another - sometimes that could be a call and response interaction other times a "fire and forget" interaction. Regardless of how they interface with one another, there still remains a need for the receipent of the interaction to verify the communication is coming from a trusted source.
3737

38-
In its most basic form, you can have this authentication paradigm look like a Service to Service Token - where the reciepent looks for a securely generated code provided as data along with the request.
38+
In its most basic form, you can have this authentication paradigm look like a Service to Service Token - where the recipient looks for a securely generated code provided as data along with the request.
3939

4040
Now let's say in our scenario, the receiving service is being communicated with by multiple senders (meaning more than one other service is writing to its API). Would it be better to:
4141

0 commit comments

Comments
 (0)