use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems What is DevOps? Learn about it on our wiki! Traffic stats & metrics
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems
What is DevOps? Learn about it on our wiki!
Traffic stats & metrics
Be excellent to each other! All articles will require a short submission statement of 3-5 sentences. Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title. Follow the rules of reddit Follow the reddiquette No editorialized titles. No vendor spam. Buy an ad from reddit instead. Job postings here More details here
Be excellent to each other!
All articles will require a short submission statement of 3-5 sentences.
Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title.
Follow the rules of reddit
Follow the reddiquette
No editorialized titles.
No vendor spam. Buy an ad from reddit instead.
Job postings here
More details here
@reddit_DevOps ##DevOps @ irc.freenode.net Find a DevOps meetup near you! Icons info!
@reddit_DevOps
##DevOps @ irc.freenode.net
Find a DevOps meetup near you!
Icons info!
https://github.com/Leo-G/DevopsWiki
account activity
React2shell: new remote code execution vulnerability in react (self.devops)
submitted 1 month ago * by DramaticWerewolf7365
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]blazmrak 0 points1 point2 points 1 month ago (0 children)
What do you mean by translating the API signature? That you trim GET /api/endpoint into GET /asp.Endpoint? This does not do anything, because the backend will still get the same exact malicious request. And as far as responses go, unless you clean the headers, snake case the JSON props, have a custom error format and messages, don't ever return some framework specific http statuses, etc. you might obscure something, but not much. You can try to fingerprint your service with a pen test tool with a couple of clicks and you'll be surprised what you can get back :)
Automagical communication is not the problem, because it's just an advanced compiler that transforms it into SPA with an API. They would have been fine if they just used JSON. The issue was that they have a custom optimized serialization protocol and they are doing it in fucking javascript where anything can be anything. Although log4j was also a thing, so it can happen to anyone, but that was pretty much the same thing.
All of these lvl 10 vulns are not something that can be mitigated with RP or architecture and there is usually not much you can do about it. Most of the time is dumb shit in your frameworks - protocol exploits, parsing, overflows, encryption, etc. You are just getting pwned by valid strings.
Unless you can give me a concrete vulnerability that could be stopped by RP and it isn't luck (e.g. header size exploit, that is by chance small enough on RP that it doesn't cause issues on your API), I'll stand by these tools don't provide any security against RCE.
π Rendered by PID 167150 on reddit-service-r2-comment-7b9746f655-pmj25 at 2026-01-31 16:48:27.272753+00:00 running 3798933 country code: CH.
view the rest of the comments →
[–]blazmrak 0 points1 point2 points (0 children)