jOpenSpace 2024
L. Casei Securitas
L. Casei Securitas - Dev to Devs
Covered intensively
Blind spots
Not covered
External threats vs. Internal threats
How to discover/implant exploitable weakness of/to a system?
Requires:
Obtained through:
The more dependencies, the more Adidas
Know your dependencies..
Supply chain attack, MavenGate
How?:
Options:
Public cloud - Github, Artifactory, ...
Allows:
Github Copilot - Syphoning secrets
Kernel level access for everything
Negative Effects:
What to read
How would
Jabba Developer
look like
Bonus 1
Bonus 2