Clara Leigh
@clara42.bsky.social
1.5K followers 870 following 240 posts
Laravel, VueJS, Cyber Security 🌈
Posts Media Videos Starter Packs
clara42.bsky.social
Working on Crypto in the #laravel world?
Hit me up, I want to see what you're doing!

I've got solana stablecoin p2p, offramps to banks and more going on over here 😍
clara42.bsky.social
Once upon a time, USBs and CDs could auto run. That’s how worms like stuxnet and Agent.BTZ spread everywhere

We learned the hard way and killed autorun

Now we `npm install` 1,000 different dependencies from the internet and consider it “safe”, forgetting that it does the exact same thing
clara42.bsky.social
10 second deploys is quite a feat!

I remember getting my server setup and install time down to 15secs at my last startup (business in a box for web) and I thought that was the coolest thing ever but no one batted an eye back then 😭 maybe I was just too early
clara42.bsky.social
Lmao I bet he just found out you’re not allowed to edit your own wiki 😂
Reposted by Clara Leigh
joe.codes
Curious what it looks like to implement the new Inertia Infinite Scroll component? Have 3 minutes? That's all it takes.

I whipped up a little demo:

youtu.be/gQB6DdPHzSY
Infinite Scrolling with Laravel + Inertia
YouTube video by Laravel
youtu.be
clara42.bsky.social
I just wish sql error logs supported it 😭
clara42.bsky.social
I’m not sure rate limiting would help other that slow them down.

Really the solution is to ensure there is no way to check if a user exists, which is doable but often tedious
clara42.bsky.social
I would define a vulnerability as something that assists in the compromise of an asset

I have seen a lot of accounts this year fall victim to phishing attacks, most of which only targeted due to UE

5 years ago, I cared little about UE but back then phishing was easier to spot
clara42.bsky.social
Is username enumeration (UE) a real vulnerability?
Yes, and it matters more today than it did a few years ago.

As phishing attacks look more legitimate, even smart people are getting tricked

This week I saw a UE+phish lead to an account take over, and the URL in the Phish was a legitimate url
clara42.bsky.social
I miss the 00s and 10s when devs building frameworks would name methods and vars like “xzy42_type” to prevent this exact issue
clara42.bsky.social
Oooo “kind” kinda works! I’ve been using “theType” or “provider”
clara42.bsky.social
If there is one thing I've learned in the last year, it's never use a property named "type"

I have lost so many hours debugging this exact bug but alas I am a goldfish just did it again, for the third time this week 😭
clara42.bsky.social
This would have saved me a few hours making some things GDPR compliant!
ashallendesign.co.uk
I've just released v1.1.0 of my Redactable Models package! 🎉

You can now set the hashing algorithm that should be used by the "HashContents" redaction strategy.

In this example, we're SHA256-ing the "name" and "email" fields of users who were soft-deleted over 30 days ago 😄
clara42.bsky.social
I love it! If you find yourself wanting another challenge or you have access to the road map, adding short lived tokens (ie OIDC) to Vapor and cloud would go a long way in securing things like GitHub actions for deployments 🙏
clara42.bsky.social
“Think like a hacker” is one of my favourite phrases

It leads to the zero trust mindset. Assume a breach will happen and brainstorm what you can do to reduce that risk

Short liven tokens are just one thing that can help. I encourage you to research OIDC tokens, it might just save you one day
clara42.bsky.social
Today I leaned about OIDC tokens and how you can use them to prevent GitHub actions from having access to long lived secrets (like AWS)

While its not yet supported by my main provider, I can certainly clean up my AWS actions and hope others add it to their roadmap 🙏

docs.github.com/en/enterpris...
OpenID Connect - GitHub Enterprise Cloud Docs
OpenID Connect allows your workflows to exchange short-lived tokens directly from your cloud provider.
docs.github.com
clara42.bsky.social
I love a community that listens!

Securing the supply chain is my current research topic and the more I learn, the more I find we can do
joe.codes
🔒 With everything going on with NPM, we're moving all over our Laravel packages over to Trusted Publishing

Now you'll know where the latest release came from and you can verify that it was us.
Screenshot of NPM that reads:

Provenance
Built and signed on GitHub Actions

View build summary 

Source Commit

github.com/inertiajs/inertia@32199e8
Build File
.github/workflows/publish.yml

Public Ledger
Transparency log entry
Reposted by Clara Leigh
packagist.com
🚨 Warning to #PHP package maintainers: We did not email you to change your passwords & 2FA. Emails asking you to update your credentials are a phishing attempt. We had the phishing site & domain taken down. If you got the email and entered your credentials, please contact us. #phpc
clara42.bsky.social
Please note its not just for enterprise!
I was just on the enterprise docs because thats what I use

For details on how to set it up for your cloud provider, check out these pages: docs.github.com/en/actions/h...
Security hardening your deployments - GitHub Docs
Use OpenID Connect within your workflows to authenticate with your cloud provider.
docs.github.com
clara42.bsky.social
Today I leaned about OIDC tokens and how you can use them to prevent GitHub actions from having access to long lived secrets (like AWS)

While its not yet supported by my main provider, I can certainly clean up my AWS actions and hope others add it to their roadmap 🙏

docs.github.com/en/enterpris...
OpenID Connect - GitHub Enterprise Cloud Docs
OpenID Connect allows your workflows to exchange short-lived tokens directly from your cloud provider.
docs.github.com
clara42.bsky.social
Today I learned about NPM Provenance, and how it helps prevent some supply chain attacks but it turns out its widely un-used and even some orgs don't use it yet (looking at you @laravel.com)

If you run any NPM repo at all, you should look at implementing it!

docs.npmjs.com/generating-p...
Generating provenance statements | npm Docs
Documentation for the npm registry, website, and command-line interface
docs.npmjs.com
clara42.bsky.social
Best game I've played in a while, if you have an hour or so to loose
neal.fun
I’m Not a Robot, a game about solving CAPTCHAs, is out now!

good luck :)

> neal.fun/not-a-robot/
clara42.bsky.social
In the past month, I've noticed a huge decrease in quality of code produced by AI.

Coincidentally in the past month, I've also seen a huge jump in external providers shipping broken features and updates

🤔
clara42.bsky.social
This week I solved a really hard coding problem which is going to save me about 2hrs a day.

I initially thought it would be impossible, but ~100 lines of regex and ~50 if() statements has solved it!

I’m going to be riding the high from this feat for a while 🥰
clara42.bsky.social
“Good faith” lmao. I think everyone knew that it was never in good faith, I wonder if this is an underhanded jab at that or if he really is oblivious