Exploiting AI-Generated Code Vulnerabilities and Their Solutions
Offered By: Snyk via YouTube
Course Description
Overview
Learn how to identify and exploit vulnerabilities in AI-generated code through practical demonstrations. Explore two specific vulnerabilities, including a cross-site scripting (XSS) attack and a NoSQL injection, and understand their potential impact on application security. Discover how attackers can leverage these weaknesses to access sensitive data and compromise system integrity. Follow along as the video guides you through the process of exploiting these vulnerabilities, demonstrating techniques such as triggering alert boxes and manipulating database queries. Gain insights into the importance of secure coding practices when working with AI-generated code. Learn how to effectively use Snyk, a security tool, to identify and fix these vulnerabilities, enhancing your ability to develop more secure applications. By the end of this tutorial, you'll have a better understanding of the risks associated with AI-generated code and the skills to mitigate them.
Syllabus
- Intro
- Getting Acquainted with the Application
- Exploiting a Vulnerability
- Further Exploiting - Triggering an Alert Box
- What's the Big Deal?
- How an Attacker can Locate your Sensitive Data
- Fixing the Vulnerability with Snyk
- Vulnerability 2
- How a NoSQL Injection Attack Works
- Passing in a Note ID
- Outro
Taught by
Snyk
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network