CodeSent, Nikita Markevich Navigating the Dangers: User Input Risks in Apigee Target URLs In today's interconnected digital world, APIs are the glue that holds various services and applications together. Apigee, a robust API management platform, empowers companies to ensure secure and effi... API Security Apigee Apigee Best Practices Apigee Security Input Validation JavaScript
CodeSent, Nikita Markevich Dealing with Path Parameters Apigee allows developers to define conditional behaviour with operators like MatchesPath , Matches , JavaRegex , == , and others, enabling them to control which flows or policies apply based on specif... API Security Apigee Apigee Best Practices Apigee Security Input Validation JavaScript
CodeSent, Nikita Markevich Beyond the Basics In the previous post , I walked you through the foundational steps to secure your Apigee proxies, covering essentials like encryption, input validation, and rate limiting. However, Apigee is a powerfu... API Security Apigee Apigee Best Practices Apigee Security
CodeSent, Nikita Markevich How to Start Securing Your Proxy When managing Apigee API proxies, security is critical to protecting sensitive data, maintaining user trust, and avoiding breaches. Whether you're new to securing proxies or looking to strengthen your... API Security Apigee Apigee Best Practices Apigee Security Data Masking DoS Prevention Input Validation OAuth Best Practices
CodeSent, Nikita Markevich Breaking the Sandbox One of Apigee’s strengths lies in its flexibility, allowing developers to extend API functionality beyond the out-of-the-box features through custom scripts and code. Among the tools available for cus... API Security Apigee Exploit Java Python RCE Vulnerability Writeup
CodeSent, Nikita Markevich Discovering Rhino’s Blind Spot Welcome to the first post in a series where I’ll be diving into the security research I conducted on Apigee throughout 2023. I spent a lot of time exploring the ins and outs of this platform, and my w... API Security Apigee Exploit Java JavaScript RCE Vulnerability Writeup