10

Secure Coding Practices for APIs

Welcome to the end of our book, which matches the beginning of your Application Programming Interface (API) pentesting journey! If you’ve been reading this book from Chapter 1, we’ve been together for quite a while, covering and learning about different aspects of APIs in their most diverse forms, sticking with penetration techniques but still having an eye on what application owners and developers should pay attention to before releasing their APIs. An API opens the door of applications, services, and entire businesses to the world. This door represents an immense responsibility for a software and is surely extensible for all the infrastructure that supports it.

The upcoming sections bring recommendations ...

Get Pentesting APIs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.