Apache GIT Workflow

Summary The proposed workflow involves hosting multiple websites using Apache on a Linux compute box in the cloud, with each virtual host as a GIT repository. The user clones the repositories to the /var/www folder, configures Apache, and uses certbot/letsencrypt for HTTPS. However, there are potential security concerns and considerations to be addressed. Root Cause … Read more

Follow up on how to avoid the “Windows Defender SmartScreen prevented an unrecognized app from starting warning” by file submission to Microsoft

Summary The Windows Defender SmartScreen warning is a common issue faced by developers when their applications are flagged as unrecognized. This warning can be frustrating, especially when the developer is certain that their application is safe. To avoid this warning, developers can submit their files to Microsoft for verification. However, the process can be unclear, … Read more

In SAML, man in the middle attack, for unsigned saml response, can the attacker modify values?

Summary The question revolves around the security of SAML (Security Assertion Markup Language) responses, specifically when they are unsigned. In a man-in-the-middle (MITM) attack, an attacker can intercept and modify the SAML response. The key concern is whether an attacker can create a new assertionId and modify the notBefore and notAfter timestamps in an unsigned … Read more

Programming language

Summary This postmortem analyzes how PHP internally handles form data, why insecure handling leads to SQL injection, XSS, and other vulnerabilities, and how senior engineers design robust validation and sanitization pipelines. The incident pattern is common: developers trust $_POST and $_GET too early, skip validation, and directly embed user input into output or queries. Root … Read more

azd pipeline config fails claiming I can’t create role assignments, but I definitely can

Summary A deployment pipeline using azd pipeline config failed with a 403 AuthorizationFailed error even though the user was a Subscription Owner and could manually create role assignments. The root cause was not missing permissions but an ABAC (Attribute-Based Access Control) condition silently blocking role assignment operations performed through the Azure CLI and the azd … Read more

nextjs runs fine locally and first worked on the server but all of a sudden it gets unexpected end of input on the server,

Summary A Next.js application that runs flawlessly on a developer machine but suddenly fails on a server with “unexpected end of input” almost always indicates a runtime-level corruption of the JavaScript bundle, not an application‑level bug. In this case, the failure appeared after a hacking incident and persisted across Docker, systemd, and even a fresh … Read more

How do I force stop a rogue Google Apps Script

Summary A Google Apps Script continued running even after the user deleted the project, removed triggers, and emptied the trash. The script kept monitoring Gmail and sending Google Voice texts because an OAuth-granted authorization token was still active on the user’s Google Account. Deleting the script does not revoke its previously granted permissions, so the … Read more