Jan. 29, 2024, 3:02 a.m. | OWASP Foundation

OWASP Foundation www.youtube.com

I'll talk through two separate security vulnerabilities, in two android applications - both disclosed on hackerone, and both leading to stolen auth tokens. I'll then talk about how we could have caught the two vulnerabilities - both from a process point of view (i.e. SAST tools, threat modelling etc) and discuss how 'safe to run' - an open source library - could have caught both.

Daniel Llewellyn
xDesign
Head of Engineering (tech enablement)

I currently work as a head of …

android applications auth caught discuss etc hackerone hacking point process run safe sast security stolen threat threat modelling tokens tools vulnerabilities

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States