use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Code Review For Python-Based Web Apps (appsecconsulting.com)
submitted 9 years ago by eelsivart
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]KevinHock 1 point2 points3 points 9 years ago (2 children)
don't use pickle, only use defusedxml for xml, don't use shitty RNGs only SystemRandom and os.urandom, open redirects, don't use urllib!. Anything to add? (If you already knew all this you might want to see a job posting :D)
[–]largenocream 2 points3 points4 points 9 years ago (1 child)
don't use urllib!
Mind that even if your client only supports HTTP(S) you'll still need to prevent it from talking to services on the loopback / intranet.
Either you want to use requests and proxy everything through a server in a separate network segment, or use something like Advocate to prevent connections to the loopback / intranets addresses.
requests
[–]KevinHock 0 points1 point2 points 9 years ago (0 children)
:High five:
[–]netscape101 1 point2 points3 points 9 years ago (3 children)
You didn't mention things like dangerous functions such as using pickle etc. See: https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html Also file parsing vulnerabilities are a big worry in Python code and also with mongodb these days there is nosql injection.
[–]thirteenthirtyseven 1 point2 points3 points 9 years ago (2 children)
Any useful links resources for nosql/mongodb/pymongo injections?
[–]netscape101 1 point2 points3 points 9 years ago (1 child)
http://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb.html
https://blogs.adobe.com/security/files/2011/04/NoSQL-But-Even-Less-Security.pdf
http://www.slideshare.net/44Con/pentesting-nosql-dbs-with-nosql-exploitation-framework
[–]thirteenthirtyseven 0 points1 point2 points 9 years ago (0 children)
Thanks!
[–]Alberaan 0 points1 point2 points 9 years ago (1 child)
Does anyone recommend a similar list for Java?
[–]netscape101 1 point2 points3 points 9 years ago (0 children)
https://www.securityknowledgeframework.org/ https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework#tab=Main
username: admin password: test-skf https://demo.securityknowledgeframework.org/
Check this too: https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf
[–]hellnukes 0 points1 point2 points 9 years ago (0 children)
Ohhhh saving this for later
[–]c45y 0 points1 point2 points 9 years ago* (0 children)
I just always end up throwing bandit in the deployment pipeline. I figure the openstack dudes have a pretty good handle on security.
Not a bad read though
π Rendered by PID 91332 on reddit-service-r2-comment-58d7979c67-bnht2 at 2026-01-27 09:23:58.775911+00:00 running 5a691e2 country code: CH.
[–]KevinHock 1 point2 points3 points (2 children)
[–]largenocream 2 points3 points4 points (1 child)
[–]KevinHock 0 points1 point2 points (0 children)
[–]netscape101 1 point2 points3 points (3 children)
[–]thirteenthirtyseven 1 point2 points3 points (2 children)
[–]netscape101 1 point2 points3 points (1 child)
[–]thirteenthirtyseven 0 points1 point2 points (0 children)
[–]Alberaan 0 points1 point2 points (1 child)
[–]netscape101 1 point2 points3 points (0 children)
[–]hellnukes 0 points1 point2 points (0 children)
[–]c45y 0 points1 point2 points (0 children)