Skip to main content
Dublin Library

The Publishing Project

Tagged “Security”

--- desc: ---
Subresource Integrity (SRI)

When you build modern web applications, you often rely on third-party services like Content Delivery Networks (CDNs) to host essential files. While CDNs improve performance, they also introduce a...

Syft And Grype Integration

Recent supply chain attacks have highlighted the need for robust vulnerability management in Node projects. While NPM Audit provides a basic level of security scanning, it has limitations that can...

NPM Security Best Practices

In recent months, we've seen a rise in security vulnerabilities related to the NPM ecosystem. As developers, it's crucial to follow best practices to ensure the security of our applications. This...

What is a supply chain attack?

Supply chain attacks are a growing threat in the software development world, particularly with the rise of open-source package managers like NPM. These attacks exploit the trust developers place in...

Solving Dependency Vulnerabilities With Overrides

One of the biggest pain in working with Node.js is dealing with dependency vulnerabilities that you can't fix because they are in a transitive dependency (a dependency of your direct dependencies)....

What is a URL? Why it matters

Whether we know it or not we work with URLs all the time. Whenever we enter a web address into the browser's omni-bar, click on a link on a web page or click on an email link, all those are...

Link to Archive

See all tags.