A developer implemented service authentication by hardcoding tokens directly in the source code, creating multiple security vulnerabilities. The system checks incoming requests against static string values, and when token rotation was needed, they simply added more hardcoded tokens to support both old and new versions simultaneously. This approach violates basic security principles by storing secrets in version control and using non-expiring tokens.

2m read timeFrom thedailywtf.com
Post cover image

Sort: