Code Review
January 23, 2024
Mitigating CWE-352: Cross-Site Request Forgery in Ruby Applications
Cross-Site Request Forgery (CSRF) is a security vulnerability that allows attackers to trick users into performing actions they don’t intend to.By PullRequest
January 22, 2024
Optimizing Performance in Generative AI: Trimming Tokens
Generative AI and Large Language Models (LLMs) like GPT-4 and Claude 2 has revolutionized the landscape of artificial intelligence and machine learning.By PullRequest
January 19, 2024
Understanding the Benefits of Key Derivation Functions: A Deep Dive into PBKDF2
Hashing values is a cornerstone technique for protecting sensitive data. However, with rising computational power, traditional hashing methods have become vulnerable to brute-force attacks.Continue reading "Understanding the Benefits of Key Derivation Functions: A Deep Dive into PBKDF2" →
By PullRequest
January 18, 2024
Harnessing AI to Pinpoint Security Hotspots in Code Review
At HackerOne, we understand the challenge of maintaining robust security in your codebase. That’s why our PullRequest product incorporates a groundbreaking feature: Smart Review Selection.By PullRequest
January 17, 2024