Exploiting AI-Generated Code Vulnerabilities and Their Solutions
Offered By: Snyk via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to identify and exploit vulnerabilities in AI-generated code through practical demonstrations. Explore two specific vulnerabilities, including a cross-site scripting (XSS) attack and a NoSQL injection, and understand their potential impact on application security. Discover how attackers can leverage these weaknesses to access sensitive data and compromise system integrity. Follow along as the video guides you through the process of exploiting these vulnerabilities, demonstrating techniques such as triggering alert boxes and manipulating database queries. Gain insights into the importance of secure coding practices when working with AI-generated code. Learn how to effectively use Snyk, a security tool, to identify and fix these vulnerabilities, enhancing your ability to develop more secure applications. By the end of this tutorial, you'll have a better understanding of the risks associated with AI-generated code and the skills to mitigate them.
Syllabus
- Intro
- Getting Acquainted with the Application
- Exploiting a Vulnerability
- Further Exploiting - Triggering an Alert Box
- What's the Big Deal?
- How an Attacker can Locate your Sensitive Data
- Fixing the Vulnerability with Snyk
- Vulnerability 2
- How a NoSQL Injection Attack Works
- Passing in a Note ID
- Outro
Taught by
Snyk
Related Courses
DevSecOps EssentialsA Cloud Guru Application Security and Monitoring
IBM via Coursera Application Security for Developers and DevOps Professionals
IBM via Coursera IBM Cloud Technical Advocate
IBM via edX Data Center Security Management with Microsoft System Center
EDUCBA via Coursera