Reasonably secure Electron // Bishop Fox // Joe DeMesy
Reasonably secure Electron // Bishop Fox // Joe DeMesy
We'll examine how various Electron exploitation techniques work, focusing primarily on cross-site scripting-remote code execution and then dive into how to design applications that can provide robust defenses against these types of attacks.