Security terms
Defending code from the threats that never sleep
Security vulnerabilities do not announce themselves — they wait quietly in code that looks perfectly fine on the surface. This category covers attack vectors, defensive techniques, secure coding practices, and the mental models that help you think like an attacker before one finds you. From SQL injection and XSS to authentication flaws and cryptographic pitfalls, understanding these terms is not optional — it is professional responsibility.
JWT Algorithm Confusion (alg:none & RS→HS) PHP 5.0+
Forging JWTs by exploiting libraries that accept alg:none or by switching an RS256 public key into HMAC-SHA256 signing.
CWE-327 OWASP A2:2021
2mo ago
security intermediate
9.1
Misimplemented JSON Web Token handling allows attackers to forge tokens, bypass authentication, or escalate privileges.
CWE-287 OWASP A2:2021
2mo ago
security intermediate
8.8