Patrick Thomas (@[email protected])

2.7K posts

Patrick Thomas (@coffeetocode@infosec.exchange) banner
Patrick Thomas (@coffeetocode@infosec.exchange)

Patrick Thomas (@[email protected])

@coffeetocode

Software engineer to security consultant, now security partner at @Netflix. Infosec pragmatist.

SF Bay Area Katılım Şubat 2010
887 Takip Edilen1.9K Takipçiler
Sabitlenmiş Tweet
Patrick Thomas (@coffeetocode@infosec.exchange)
"Penetration Test" is a crazy overloaded term. Important to start w/ discussion of goals and tradeoffs between testers and client team.
Patrick Thomas (@coffeetocode@infosec.exchange) tweet media
English
22
683
930
0
Patrick Thomas (@coffeetocode@infosec.exchange)
I love formal forecasting exercises (esp those run by @Magoo) because they really force you to slow down consider all the potentially relevant facts, and introspect your biases. FWIW I was 80% here, but I think I was undervaluing the "autopilot" nature of modern CI/CD.
Ryan McGeehan@Magoo

That's what myself and 26 others sought to gather over the weekend. The panel we put together forecasted a 72.8% belief it would happen. Here's the spread of forecasts magoo.github.io/risk-measureme…

English
1
0
1
0
Leif Dreizler
Leif Dreizler@leifdreizler·
@coffeetocode I wonder what the stat would be if you compared people that have tweeted vs tooted (is that what mastodon calls a tweet?) in the last two weeks
English
1
0
0
0
Patrick Thomas (@coffeetocode@infosec.exchange)
Of the ~950 people I follow on twitter, some hacky profile scraping says that about 60 of those currently have a Mastodon link. So for me that's basically from ~0% to 15% exodus (or at least strongly hedging) in a *week*.
English
2
0
3
0
Patrick Thomas (@coffeetocode@infosec.exchange)
@ropnop @nart_nos @hez0_ ...now I just wanna spend the rest of the day ducking with serviceworkers. Also, doesn't this seem like a pattern that could be codified in a browser mechanism the same way httponly is? (Or is it and I just missed it?)
English
0
0
0
0
Ronnie Flathers
Ronnie Flathers@ropnop·
@nart_nos @coffeetocode @hez0_ Yep! I mean the best defense is to ensure you just don’t have XSS in the first place, but service workers can be a nice defense in depth approach to protect sensitive data
English
1
0
1
0
Ronnie Flathers
Ronnie Flathers@ropnop·
Wrote a new blogpost! Had a great debate last week about where to store session tokens when building a SPA, so I decided to PoC the main strategies and discuss the pros/cons of each: blog.ropnop.com/storing-tokens…
English
2
41
88
0
hez_
hez_@hez0_·
@ropnop @coffeetocode I was learning about OAuth, but somehow found myself looking for bypass :D Riding on this, here's one more (even though the blogpost is dated, but still useful :)): Headers.prototype.set = function(arg, arg1){alert("Stolen token: "+arg1)}; makeRequest();
hez_ tweet media
English
1
0
2
0
Clint Gibler
Clint Gibler@clintgibler·
tl;dr sec is now over 12,000 subscribers 🎉 🤯 Thank you everyone for the kind words and encouragement along the way 🙏 New to tl;dr sec? Get the latest and greatest security research right in your inbox 👇 tldrsec.com
English
7
29
126
0
Patrick Thomas (@[email protected]) retweetledi
Thomas H. Ptacek
Thomas H. Ptacek@tqbf·
I don’t think there’s a SOC2 rule against banking 50 pre-approved empty PRs for future use.
English
4
3
75
0
Patrick Thomas (@coffeetocode@infosec.exchange)
When looking at a big backlog of known work we want to drive, it's *so easy* to just group into themes and call it good. I can think of times I've done that which really, really would have benefitted from asking if the framing leads to an ability to confidently prioritize. 2/2
English
0
0
0
0
Patrick Thomas (@coffeetocode@infosec.exchange)
Someone asked today "Is that list of 'goals' *really* a list of goals, or just a some themes of work?" I *love* that question & the insight behind it. True "goals" help prioritize among possible work, themes really don't. 1/2
English
1
0
2
0
Patrick Thomas (@[email protected]) retweetledi
Aaron Boodman
Aaron Boodman@aboodman·
Chrome was delivered without any sprints at all. The team came in at 9 and left at 5 (figuratively, people actually kept their own ~8h schedules) every workday for a couple years like clockwork. No drama. No broken marriages, no broken families.
Hadi Partovi@hadip

Sadly, there were divorces and broken families and bad things that came out of that. But I also learned that even at a 20,000-person company, you can get a team of 100 people to work like their lives depend on it.

Tustin, CA 🇺🇸 English
67
1.9K
11K
0
cje
cje@caseyjohnellis·
vulnerability assessment: enumerating vulnerabilities penetration test: enumerating impact red team: testing capabilities of a blue team
English
10
17
134
0
Patrick Thomas (@coffeetocode@infosec.exchange)
Congrats to @Resourcely! Clear, exciting product vision at that critical touchpoint of developer velocity, security, and cloud resources. Very pleased to have joined this round, and looking forward to seeing where @travismcpeak and @0xshellrider take this idea.
Resourcely@Resourcely

Hello world! We're on a mission to make cloud security easier for users. See our funding announcement (techcrunch.com/2022/07/26/res…) and blog post (resourcely.io/post/introduci…) for more details. We're #Hiring!

English
1
0
8
0