Too Long; Didn't Read
The concept of sources and sinks originally comes from security code reviews. It is in reference to the fact that data flows through the application and the logic that processes it into a so-called sink. Security researchers commonly do something called “Taint Tracking” or ‘Taint Analysis’ This is already pretty hard to do in large scale applications, but with enough effort it is achievable.
@secbyaccident
Security by Accident
Posting about cybersec and OSINT from the perspective of a Red Teamer.
Receive Stories from @secbyaccident
RELATED STORIES
L O A D I N G
. . . comments & more!