Sqreen Blog
  • Docs
Sqreen Blog

The Official Sqreen Blog

  • Docs

Vladimir

15 posts
Dynamic Instrumentation in Node.js
  • Dev
  • Node.js
  • Sqreen Product
  • 46 views
  • 7 minute read
  • 2 comments

Behind the Scenes: Building a Dynamic Instrumentation Agent for Node.js

  • Vladimir
  • March 9, 2017
TL;DR Building a dynamic instrumentation agent for Node.js is a complex challenge. At Sqreen, we provide a powerful security tool for development teams using Node.js. You will be able to…
View Post
How to avoid NoSQL injections in MongoDB in a Node.js app
  • Node.js
  • Security
  • 62 views
  • 3 minute read
  • 2 comments

How to prevent NoSQL injections in MongoDB in a Node.js app

  • Vladimir
  • January 12, 2017
Continued MongoDB breaches have cruelly reminded MongoDB users that security should be a major concern. But configuration is not the only weak spot in MongoDB’s armor. Here is the second…
View Post
NoSQL injections in Node.js with MongoDB
  • Node.js
  • Security
  • 99 views
  • 4 minute read
  • 8 comments

MongoDB will not prevent NoSQL injections in your Node.js app

  • Vladimir
  • December 15, 2016
Last updated: December, 2020 The follow-up on how to prevent NoSQL injections in MongoDB in a Node.js app can be found here. TL;DR – Mongo and Node.js are not safe…
View Post
Tor Node.js Banner
  • Dev
  • Node.js
  • Security
  • 29 views
  • 3 minute read
  • No comments

Identify Tor connections in Node.js with Tor-test

  • Vladimir
  • November 15, 2016
We released a new feature to our web-application protection tool: Sqreen now monitors the user traffic originated from Tor. All security events linked to such connections is highlighted, and particular…
View Post
Malicious Code Injections in Node.js
  • JavaScript
  • Node.js
  • Security
  • 93 views
  • 5 minute read
  • 9 comments

One easy way to inject malicious code in any Node.js application

  • Vladimir
  • August 22, 2016
tl;dr This article describes a method of injecting arbitrary code in Node.js modules. It does not encourage unethical behavior. The chain used to include instances of modules can be tampered to…
View Post

Posts navigation

Previous 1 2
Search
Recent Posts
  • Democratizing security: The next step in Sqreen’s journey
  • Heroku Security: Securing your Heroku application
  • What is a Content Security Policy (CSP) and why is it important?
  • CIS 20 overview and what not to miss
  • Building secure applications: Top 10 application security best practices
Categories
  • Dev (56)
  • DevOps (14)
  • Go (5)
  • Java (4)
  • JavaScript (7)
  • Node.js (15)
  • PHP (3)
  • Python (18)
  • Ruby (16)
  • Security (136)
  • Sqreen Product (35)
By the Sqreen Team ❤
© Sqreen 2015-2021 – Privacy Policy