๐•ฏ๐–Š๐–›๐•ฐ๐–“๐–“๐–ž

9K posts

๐•ฏ๐–Š๐–›๐•ฐ๐–“๐–“๐–ž banner
๐•ฏ๐–Š๐–›๐•ฐ๐–“๐–“๐–ž

๐•ฏ๐–Š๐–›๐•ฐ๐–“๐–“๐–ž

@ennycodes

CS โ€ข Student || Full Stack Developer

Entrou em Temmuz 2023
990 Seguindo6.6K Seguidores
๐•ฏ๐–Š๐–›๐•ฐ๐–“๐–“๐–ž
Noticed a bug just now. It I decide to click on a post to check the comments, then I go back to the main wall it goes back to the first post again having me to scroll down to the post I was before. Other than that, itโ€™s really good. Yโ€™all should check it out ๐ŸŒš @stanlee0nX
Stanlee | Web developer@stanlee0nX

@ennycodes Use my app and tag me sire๐Ÿ™๐Ÿพ de-boothe.vercel.app

English
1
0
1
31
Zion
Zion@ube_codesยท
@ennycodes You can still code or is it wrong to work during the holiday?
English
1
0
0
4
Treasure โœฐ
Treasure โœฐ@0xTreasureยท
happy eid mubarak to all my muslim mutuals!๐Ÿ’œ abeg i fit see small rice for una side?๐Ÿ˜ญ๐Ÿคฒ๐Ÿฝ
English
4
1
9
40
Venkatesh
Venkatesh@Venkydotdevยท
Life of a Gen Z male: > College degree is worthless > Always in debt > Rent is more than half your paycheck > AI is replacing your job > Never will be able to afford a house > WW3 may start > Impossible to get a girlfriend > Boomers saying โ€œjust work harder.โ€ > No time to just enjoy life
English
8
0
13
125
Ola
Ola@dev_olayinkaยท
Eid Mubarak to my brothers and Sisters in Islam โ˜ช๏ธ โœจ๏ธ Qoute with your Eid Pictures ๐Ÿค
Ola tweet mediaOla tweet mediaOla tweet mediaOla tweet media
English
3
2
20
239
๐•ฏ๐–Š๐–›๐•ฐ๐–“๐–“๐–ž retweetou
Emmy Codes ๐Ÿช–๐Ÿš€๐Ÿ‘จโ€๐Ÿ’ป
API Security Best Practices API security refers to the practices and mechanisms used to protect APIs from unauthorized access, abuse, and data breaches. It ensures only trusted users and systems can interact with backend services. Secure APIs protect sensitive data and maintain system integrity. Why API Security Is Important - APIs expose backend services to external applications - Poorly secured APIs can lead to data leaks and system compromise - Many modern applications rely heavily on APIs for communication - Protects user data, financial transactions, and business logic Authentication and Authorization - Always require authentication before granting API access - Use strong authorization mechanisms to control user permissions - Implement token-based authentication such as JWT - Ensure role-based or permission-based access control Use HTTPS for Encryption - Encrypt all API communications using HTTPS - Prevents attackers from intercepting sensitive data - Protects login credentials, tokens, and user information - Avoid transmitting sensitive data over unencrypted connections Input Validation - Validate all incoming data before processing it - Prevent malicious inputs such as SQL injection or script injection - Enforce strict data types and formats - Reject unexpected or malformed requests Rate Limiting and Throttling - Limit the number of requests a client can send - Prevent brute-force attacks and API abuse - Protect backend resources from overload - Example: limit requests per minute per user or IP API Keys and Tokens - Use API keys to identify applications accessing your API - Rotate API keys periodically - Store keys securely and avoid exposing them publicly - Combine API keys with stronger authentication methods Secure Error Handling - Avoid exposing internal system details in error messages - Do not reveal database queries or stack traces - Return generic error messages to clients - Log detailed errors internally for debugging Implement Access Control - Restrict access to sensitive endpoints - Apply least-privilege access principles - Ensure users only access resources they own or are permitted to use Monitoring and Logging - Log API activity for auditing and investigation - Monitor unusual traffic patterns - Detect suspicious behavior early - Use monitoring tools to track request metrics and failures API Versioning - Maintain different versions of APIs when changes are made - Prevent breaking existing client applications - Secure deprecated versions before removing them Protection Against Common Attacks SQL Injection - Sanitize inputs and use parameterized queries Cross-Site Scripting (XSS) - Validate and encode user-generated content Denial of Service (DoS) - Implement rate limiting and traffic filtering Best Practices Summary - Always authenticate and authorize API requests - Encrypt communication using HTTPS - Validate and sanitize all inputs - Implement rate limiting and monitoring - Protect API keys and tokens securely - Log and analyze API usage patterns Stay safe out there โ€” secure APIs = secure apps!
Emmy Codes ๐Ÿช–๐Ÿš€๐Ÿ‘จโ€๐Ÿ’ป tweet media
English
2
5
9
180
Alfin
Alfin@AlfinCodesยท
Developers be honest. What was your first code editor?
Alfin tweet media
English
55
0
36
1.7K
Edison
Edison@CodeEdisonยท
Your Tech Stack skills in 2026 should look like: Languages & Core - TypeScript - Python - Rust / Go Frameworks & Backing - Next.js / SvelteKit - FastAPI / Node.js - PostgreSQL / MongoDB - Redis - Drizzle ORM / Prisma AI IDEs & Editors - Cursor - Windsurf IDE - Zed - Google Antigravity Autonomous Coding Agents - Claude Code - Cline - Aider - OpenCode / Amp Infra & Deployment - Docker & Kubernetes - Vercel AI - AWS / Kuberns AI Orchestration & Frameworks - LangChain / LangGraph - CrewAI - Microsoft AutoGen - Vellum AI Vector Databases - Pinecone - Qdrant - Milvus
English
6
4
36
1.2K
Alfin
Alfin@AlfinCodesยท
How much RAM is enough for you? 1. 8GB 2. 16GB 3. 32GB 4. 64GB+
Alfin tweet media
English
30
0
26
555
Jahir Sheikh
Jahir Sheikh@jahirsheikh8ยท
Applying for dev jobs be like: > portfolio looks fire > resume updated > LeetCode grind done > cover letter personalized > hit submit > refresh email every 5 mins > tell friends you got this response: "we've filled this position internally" ๐Ÿ’€
English
11
0
13
114