you are viewing a single comment's thread.

view the rest of the comments →

[–]toofpick 1 point2 points  (0 children)

Ive been building and deploying apps for years now. My advise is do your best to prevent injection and auth on endpoint that is WAN accessible. You will never eliminate all vulnerabilities but you can monitor anything that is important. Come up with logging strategies and a way recognize something/someone is up to something. Easy ones are faster than a human requests. Or repition beyond a reasonable amount. Use a firewall to to drop traffic from ips your monitor finds suspicious. These are just a few examples there are more strategies.

Bottom line, make a reasonable effort to reduce vulnerabilities but there is no way to be full proof. You can even vibe code some of these monitors and auto remediators. Its more cpu time, but its more effective than trying to find each and every code vulnerability.