NodeJs: Dependency-based attacks
  • Introduction
  • Dependency-based attacks
  • Javascript weaknesses
  • Types of dependency-based attacks
  • Prevention
  • Bibliography
Powered by GitBook
On this page

Was this helpful?

Bibliography

PreviousPrevention

Last updated 4 years ago

Was this helpful?

[1]“5 Node.js Security Risks You Cannot Ignore – KeenEthics Blog.” (accessed Jan. 16, 2021).

[2]“10 npm Security Best Practices | Snyk,” Feb. 19, 2019. (accessed Jan. 16, 2021).

[3]“Dependency Injection in nodejs. After spending a fair bit of time in… | by Magnus Tovslid | Medium.” (accessed Jan. 16, 2021).

[4]“How NPM Malware Works | Phylum.io,” Phylum, Aug. 28, 2020. (accessed Jan. 16, 2021).

[5]“How to make your NodeJS application or API secure | by Andreas DEV | ITNEXT.” (accessed Jan. 16, 2021).

[6]A. DEV, “How to make your NodeJS dynamic application or API secure,” Medium, Aug. 27, 2020. (accessed Jan. 16, 2021).

[7]“How to prevent malicious packages | Snyk.” (accessed Jan. 16, 2021).

[8]“The Anatomy of a Malicious NPM package,” Phylum, Aug. 21, 2020. (accessed Jan. 16, 2021).

https://keenethics.com/blog/nodejs-security
https://snyk.io/blog/ten-npm-security-best-practices/
https://medium.com/@magnusjt/dependency-injection-in-nodejs-9601a19c1f36
https://blog.phylum.io/nodejs-npm-malicious-javascript-package/
https://itnext.io/make-security-on-your-nodejs-api-the-priority-50da8dc71d68
https://itnext.io/make-security-on-your-nodejs-api-the-priority-50da8dc71d68
https://snyk.io/blog/publishing-malicious-packages/
https://blog.phylum.io/malicious-javascript-code-in-npm-malware/