Tagged articles
16 articles
Page 1 of 1
Sohu Tech Products
Sohu Tech Products
May 7, 2025 · Information Security

Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations

This article provides a comprehensive security analysis of the Model Context Protocol (MCP), exposing multiple attack vectors such as prompt poisoning, tool poisoning, command and code injection, and illustrating how MCP’s design flaws make it more vulnerable than traditional applications while offering concrete mitigation recommendations.

AI SafetyCode InjectionMCP
0 likes · 34 min read
Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations
Java Backend Technology
Java Backend Technology
Apr 30, 2025 · Information Security

When AI Becomes the Suspect: Dissecting a Crypto Theft and Code‑Poisoning Case

A crypto firm lost hundreds of thousands of USDT after a hard‑coded wallet address, allegedly inserted by an employee who blamed AI, prompting investigators to rule out AI misconduct and highlight human sabotage, while a separate ChatGPT‑generated code snippet secretly exfiltrated private keys, underscoring the emerging security risks of AI‑assisted programming.

AI riskAI securityBlockchain
0 likes · 4 min read
When AI Becomes the Suspect: Dissecting a Crypto Theft and Code‑Poisoning Case
Alibaba Cloud Developer
Alibaba Cloud Developer
Nov 19, 2024 · Operations

Zero‑Intrusion Go Instrumentation: Auto‑Inject Monitoring & Governance

This article introduces a compile‑time, zero‑intrusion auto‑instrumentation technique for Go applications that enables seamless monitoring, service governance, security checks, and traffic protection through modular JSON‑driven code injection, with practical examples covering HTTP headers, sorting algorithms, SQL injection prevention, and gRPC traffic control.

Code InjectionGoInstrumentation
0 likes · 17 min read
Zero‑Intrusion Go Instrumentation: Auto‑Inject Monitoring & Governance
MaGe Linux Operations
MaGe Linux Operations
Apr 23, 2022 · Information Security

What Are the Most Common Python Vulnerabilities and How to Fix Them?

Python, a widely used high‑level language, suffers from several critical vulnerabilities—including command injection, outdated versions, insecure temporary files, misuse of assert statements, and import path issues—each explained with practical mitigation strategies to help developers secure their applications.

Code InjectionPythonassert statements
0 likes · 7 min read
What Are the Most Common Python Vulnerabilities and How to Fix Them?
Programmer DD
Programmer DD
Mar 2, 2022 · Information Security

Critical Spring Cloud Gateway Vulnerabilities and How to Mitigate Them

The article outlines two Spring Cloud Gateway CVEs—CVE-2022-22947 (critical code injection) and CVE-2022-22946 (medium HTTP/2 TrustManager issue)—detailing their severity, affected versions, and recommended mitigation steps such as upgrading to 3.1.1+, disabling Actuator, or securing it with Spring Security.

CVECode InjectionHTTP2
0 likes · 4 min read
Critical Spring Cloud Gateway Vulnerabilities and How to Mitigate Them
21CTO
21CTO
Oct 15, 2021 · Information Security

How a WeChat Payment System Was Hijacked: A Code‑Injection Theft Case Study

This article details how a former technical director inserted malicious code into a company's WeChat payment platform, diverting millions of yuan to his own account, the subsequent investigation, witness testimonies, and the court's judgment sentencing him for large‑scale theft.

Code InjectionWeChatinformation security
0 likes · 7 min read
How a WeChat Payment System Was Hijacked: A Code‑Injection Theft Case Study
Programmer DD
Programmer DD
Apr 24, 2021 · Information Security

When a Research Paper Turned Into a Linux Kernel Security Disaster

A controversial university paper on covertly injecting vulnerabilities into open‑source software sparked a chain of malicious Linux kernel patches, provoked a fierce response from maintainer Greg Kroah‑Hartman, and forced the University of Minnesota to suspend the research amid heated community debate.

Academic PaperCode InjectionLinux
0 likes · 7 min read
When a Research Paper Turned Into a Linux Kernel Security Disaster
Beike Product & Technology
Beike Product & Technology
Oct 14, 2020 · Mobile Development

Implementing Aspect‑Oriented Programming in Flutter with AspectD

This article explains how the open‑source AspectD library enables Aspect‑Oriented Programming in Flutter by modifying the app.dill intermediate file, covering Flutter's compilation process, AST manipulation, point‑cut designs, code conversion flow, and practical use cases such as performance monitoring and page‑view tracking.

ASTAspectDCode Injection
0 likes · 11 min read
Implementing Aspect‑Oriented Programming in Flutter with AspectD
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2017 · Information Security

How to Exploit and Secure Python's eval: Bypass Tricks and Whitelist Defenses

This article explains how Python's eval can execute arbitrary code, demonstrates multiple bypass techniques—including __import__, __builtins__ manipulation, and object subclass exploitation—and shows how to safely restrict eval using whitelist globals or ast.literal_eval to prevent code injection and denial‑of‑service attacks.

Code InjectionPythonSecurity
0 likes · 9 min read
How to Exploit and Secure Python's eval: Bypass Tricks and Whitelist Defenses
Node Underground
Node Underground
Aug 31, 2016 · Information Security

How Global Hook Injection Threatens Node.js Apps and How to Defend

Understanding the nature of security blind spots, this article explains how malicious modules can attach global hooks to inject arbitrary code into Node.js applications, highlighting the risks of module imports and offering insight into protecting against such injection attacks.

Code InjectionNode.jsSecurity
0 likes · 1 min read
How Global Hook Injection Threatens Node.js Apps and How to Defend
ITPUB
ITPUB
Jul 18, 2016 · Game Development

Implementing Lua‑Based Hot‑Update in Unity Without Rebuilding the Game

This article explains a practical approach to implementing hot‑update in Unity games by injecting Lua‑based patches into C# methods using SLua and the NRefactory library, detailing the execution environment, code‑injection process, Lua patch creation, and a reusable MethodInjector class.

C#Code InjectionHot Update
0 likes · 12 min read
Implementing Lua‑Based Hot‑Update in Unity Without Rebuilding the Game
Big Data and Microservices
Big Data and Microservices
Mar 28, 2016 · Information Security

Understanding Database SQL Injection: Types, Examples, and Defense Strategies

The article examines why databases are frequent targets of security breaches, explains the most common SQL injection vulnerability, categorizes injection paths, methods, and examples—including manipulation, code, function‑call, and buffer‑overflow attacks—then outlines practical defense measures such as input encryption, database firewalls, and patching.

Code InjectionDatabase SecurityOracle
0 likes · 14 min read
Understanding Database SQL Injection: Types, Examples, and Defense Strategies