If you’re a developer looking to better understand security vulnerabilities, this is one of the best books out there on the topic. While this book specifically focuses on Command Injection vulnerabilities in Node, the content contained within is broadly applicable to any developers writing software. It’s an A++ book and absolutely worth the time to read and analyze.
Now for some more in-depth information =)
Liran is a top-tier security researcher and developer who’s an icon in the security space. Seriously, look him up on Google, he’s amazing.
The approach he takes with this book is to go INCREDIBLY in-depth into practical, real-world command injection vulnerabilities, carefully explaining everything you need to know about them as you work through the book. One of the things I really enjoy about his writing style is that he chose to use real-world vulnerability examples all throughout the book, so you’ll actually see real-world instances of how other developers didn’t think through input sanitization properly, or took odd approaches to security that still left them vulnerable to exploitation. Some of the examples contained within are high-profile command injection vulnerabilities discovered by Liran himself!
Additionally, unlike many other security books that cover topics at only a high-level, Liran takes an in-depth approach. Throughout the book you’ll be exposed to many different flavors of command injection, while Liran carefully explains every little detail about what’s happening, what the solutions are, how to think about them, and what they might have done better in the first place. It’s an incredibly comprehensive look at the developer-security mindset and gives you a thorough understanding of developer security by the end of the book.
As a long-time developer and security person myself, I absolutely loved this book and would wholeheartedly recommend it to any developers, junior or senior, who are looking to expand their security knowledge and gain a more in-depth understanding of how to think about and build secure applications.