blog.trailofbits.com
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-22 2026 | Detect Go's silent arithmetic bugs with go-panikintFuzzing | Detect Go's silent arithmetic bugs with go-panikint |
| 2026-04-11 2026 | Unleashing Medusa: Smart Contract FuzzingFuzzing | Unleashing Medusa: Smart Contract Fuzzing |
| 2026-04-10 2026 | Supply Chain Attacks Are Exploiting Our AssumptionsSupply Chain | Supply Chain Attacks Are Exploiting Our Assumptions |
| 2026-04-10 2026 | Prompt Injection to RCE in AI AgentsRCE | Prompt Injection to RCE in AI Agents |
| 2026-04-10 2026 | Marshal Madness: A Brief History of Ruby Deserialization ExploitsDeser | Marshal Madness: A Brief History of Ruby Deserialization Exploits |
| 2025-08-14 2025 | Security assessment techniques for Go projects | Trail of Bits Blog | The content is about security assessment techniques specifically tailored for Go projects, as discussed on the Trail of Bits Blog. It likely delves into methods and strategies for evaluating and enhancing the security of software written in the Go programming language. The blog post may cover best practices, tools, and approaches to identify and mitigate security vulnerabilities in Go projects. |
| 2020-05-27 2020 | Security assessment techniques for Go projects | Trail of Bits Blog | Trail of Bits Assurance practice is focusing on assessing Go projects after the success of their Kubernetes assessment. They are adapting security assessment techniques for Go projects. |