Contributions

Article
kudos to Kirill from the security research team who worked on this discovery as well as providing the fixes (!) and many thanks and appreciation to the Sequelize project maintainers who worked with us on the responsible disclosure and promptly issued fixes to vulnerable versions where necessary.
Article
How do you cope with the issues of libraries having security vulnerabilities but there's no fix yet? With open source packages this might even be more apparent than ever. Maintainer are rightfully not in any contract to provide you support, yet you rely on third-party software by volunteers.

In this piece I want to show you how we've adopted surgical patches to help remove this burden and risk from users.
Article
I have a small serverless side-project that I'm hosting on AWS Lambda and I was keen on sharing my story of how I'm tracking security vulnerabilities for functions deployed to the cloud. Since that's quite different than containers or traditional application servers it may not be very obvious as to why we actually need to track them or how to do it.

This article is detailing the step by step journey I did for my personal side-project and why it's so important.
Article
Serverless doesn't mean "less" security, instead we should fine-tune our focus area to security implications that accompany a serverless architecture and understand the relevant best practices to follow.
Update
Affected versions of axios are vulnerable to Denial of Service (DoS) because content continues to be processed from requests even after maxContentLength is exceeded, causing increased I/O and CPU usage.
Article
To minimize exposure, opt-in to create a dedicated user and a dedicated group in the Docker image for the application; use the USER directive in the Dockerfile to ensure the container runs the application with the least privileged access possible.
Article
The Node.js runtime is known to have many strengths, but one of them, the single threaded Event Loop, can also be its weakest link if not used correctly. This happens more regularly than one might think.

Regular expression denial of service (ReDoS) attacks exploit the non-linear worst-case complexity vulnerabilities that some regex patterns can lead to. For a single-threaded runtime this could be devastating, and this is why Node.js is significantly affected by this type of vulnerability.
Library
A Node.js express middleware that implements API versioning for route controllers
Article
I published a thing about Consumer-Driven Contracts testing. Perhaps the most comprehensive guide on integration testing for API microservices in Node.js or in other words - How to avoid the pains of breaking your API for consumers!
Tutorial
Life is good! Or so I thought…
what would have happened had I slipped a change into the project’s package.json file but had forgotten to commit the lockfile along side of it?
Tutorial
A cheat sheet that focuses on npm security and productivity tips for both open source maintainers and developers.

Starting off with classic mistakes such as people adding their passwords to the npm packages they publish, importance of two-factor authentication (2FA), tokens in your CI and the value of running a local npm proxy like Verdaccio
Library
Node.js CLI tool to visualize an aggregate list of your dependencies' licenses
Library
NodeJS JavaScript library to convert unix or linux CRON syntax to Quartz Scheduler