Get live statistics and analysis of Joshua's profile on X / Twitter

Research Engineer | Ethical Hacker | cybersecurity-software.com | ☎️ Need a security expert ? DM

36 following74 followers

The Analyst

Meet Joshua, the insightful Research Engineer and Ethical Hacker who loves to decode the mysteries of online safety and web development. With a sharp focus on cybersecurity and tech solutions, he balances detailed analyses with practical applications, all while advocating for best practices in digital security. His tweets are a mix of tech tips, personal projects, and thoughtful inquiries—perfect for those diving into the world of coding and cybersecurity!

Impressions
0
$0
Likes
0
0%
Retweets
0
0%
Replies
0
0%
Bookmarks
0
0%

Joshua: the only guy I know who thinks posting a 163-line code snippet is a great way to connect with people. Your tweets need more emojis and fewer 'Did you know about SSRF?' moments. Let's spice it up, shall we?

One of Joshua's biggest wins was initiating a Cybersecurity Software Directory, reaching 20 entries in a single day—showing his commitment to sharing valuable resources with the community!

Joshua's life purpose revolves around empowering individuals and companies to achieve digital safety while promoting ethical practices in technology.

He believes in the power of knowledge-sharing, continuous learning, and the significance of ethical standards in the tech industry. Joshua values transparency and cooperation as key elements in building safer digital spaces.

Joshua's biggest strengths are his analytical skills, problem-solving capabilities, and a knack for simplifying complex technical concepts, which makes him a valuable resource for anyone seeking cybersecurity guidance.

However, he may tend to get too deep into the technical rabbit hole, occasionally leaving his audience confused rather than enlightened—a reminder to keep things accessible and engaging.

To grow his audience on X, Joshua should engage more with followers through polls, questions, and interactive content. Sharing behind-the-scenes of his projects and asking for input could foster community involvement and encourage more discussions.

Fun fact: Joshua recently built a landing page for his wife's nutrition coaching business in under three hours, showcasing not just his tech skills but his dedicated support for her entrepreneurial journey!

Top tweets of Joshua

Ever wondered how to build a landing page in just 3 hours, even if you've never done it before ? 🤔 Let me show you how I did it for my wife's nutrition coaching business 👇 My wife want to start her nutrition coaching business, mainly focusing on people with (high) fitness goals. Besides being incredibly talented, she has a natural gift for understanding and helping others. To help her succeed, she needs to get her name out there, which means building a landing page. I thought this would be a nightmare, but surprisingly, it only took less than 3 hours. Here’s how: First off, here’s the final result (web version): Having never made one before, I needed to understand what's necessary to create something that captures users and converts them into clients. After a quick search, I found @namyakhann's account, which is a masterclass on the subject. Their pinned tweet was exactly what I needed, a clear visual guide on creating a high-converting landing page. The most recommended tools for creating landing pages are Framer and Webflow, but neither allows exporting code. As a developer, I prefer the freedom to change platforms and make manual modifications if needed. Webstudio is an alternative that allows code export. Although not in my preferred language, I gave it a shot and had a basic start in 30 minutes. But there was a big problem: it wasn't responsive, and I figured most potential clients would view the site on smartphones. Not wanting to learn Webstudio in-depth, I decided to go manual with AI assistance. I put three tools to the test: - Claude 3.5 Sonnet - ChatGPT o1-preview - Bolt from @stackblitz I'd just heard about it on Twitter The goal was to give the same initial prompt to all three, work on site components, keep the best option each time, and iterate. My prompt wasn't crucial, but the two input images were : - The anatomy of a high-converting landing page and - My Webstudio screenshot (for colors). In less than 15 minutes, I had my landing page. Bolt did 95% of the work, outperforming in every aspect. The big plus? I didn't even need to pay. The only downside was that I asked for HTML code (and selected this project type) but ended up with a React project. I'll let that slide. Also, I didn't mention it, but the site is perfectly responsive, thanks @stackblitz I know the site isn't perfect and I didn't follow all the guidelines. I think one big missing point will be adding the demo video in the "main content". Apart from simply having a video, I think it also adds a visual element that should speak directly to the customer. There are also all the code optimizations with the right meta tags etc... However, for me it's an excellent start that we can always continue to improve, either on our own, or by serving as a basis for a professional to do better. I'd also like to point out that all the texts / reviews are AI generated and will be changed before the site is released 😄 For the rest, if you have any suggestions, I'd love to hear them ! ❤️

1k

6⃣ [PART 6] What is Web Application Security ? I've observed that many of you have a SaaS that requires the user to provide a URL and a request is made to the website. But without the right practices, you're exposing yourself to a very dangerous vulnerability. Server-Side Request Forgery (SSRF) -------------------------------- An SSRF occurs when an attacker can make your server perform requests to unintended locations. It's like tricking your server into becoming a proxy to access internal services or private networks. There are several types of SSRF, but for this post we'll concentrate on the “basic” one. ► Your service requests a URL from the user ► The backend makes the request and displays the response Without protection, it is therefore possible to interrogate internal resources and retrieve sensitive information. It's even worse in cloud environments: on AWS, for example, it's possible to retrieve IAM credentials, and then it's party time for the attacker. Depending on the logic of the application and how the request is made, it's more or less complicated to prevent this. Possible defensive measures include : ► URL Validation and an allowlist ► Proper DNS Resolution ► Network-Level Protection ► Cloud Platform Specific Protections I wanted to include an example of what a good example looks like, but the code is 163 lines long, so instead, what I recommend is that you rely on a robust, well-proven SSRF protection library.

1k

9⃣ [PART 9] What Is Web Application Security ? What is a security audit ? 🤔 Spoiler alert: your small project needs it too, and it doesn't have to break the bank! Better known as pentesting (penetration testing), it's like inviting a professional thief to try and break into your house, but for your application. He'll try to find security holes before the bad guys do. It's all about hiring someone who thinks like an attacker. "But I'm just a small fish, who would want to hack me?" Here's the truth: automated scanners don't care about your size and smaller projects are often targeted because attackers assume they have weaker security. Some real scenarios : 1/ SaaS startup with 10 customers ► Never had a security audit ► Got hacked through a simple vulnerability ► Lost multiples customers ► Revenue impact: -$45,000/year 2/ Small e-commerce site ► First pentest revealed SQL injection ► Could have exposed 3,000 customer records ► Cost of pentest: $1,500 ► Just in potential GDPR fine avoided: A lot If you've never had a pentest, start with a one-day security audit. It's like a quick health check for your application 🏗️ What You Get: ► Quick identification of obvious vulnerabilities ► Basic security posture assessment ► Priority recommendations ► A starting point for your security journey Once you're more established, you should: ► Do "Regular" Audits ► Vary Your Testing Approaches (BlackBox, GreyBox, WhiteBox) ► Use Different Companies, why? Because different testers = different methodologies = better coverage A pentest with no finding isn't a waste! It's like a clean bill of health from your doctor. It means: ► Your security practices are working ► You have documentation of your security posture ► You can prove due diligence to customers ► You have a baseline for future comparison Practical Next Steps 📝 - Book a one-day security audit - Focus on critical components - Get quick wins - Address findings - Implement basic security monitoring - Document your security practices - Plan regular testing schedule - Build security into development

593

4⃣ [PART 4] What is Web Application Security ? Web Security Threats and How to Protect Against Them Cross-Site Scripting (XSS) ----------------------- XSS occurs when attackers inject malicious JavaScript into your website. Think of it as someone sneaking malicious code into your application that then runs in your users' browsers. There are three main types of XSS, and yes, they're all dangerous ! 1/ Reflected XSS : This is like a boomerang, the malicious code is part of the user's request and gets immediately reflected back. Example scenario: ► Attacker creates a link: `https://yourapp[.]com/search?q=` ► Sends it to a victim ► Your app displays the search term without sanitization Victim's browser executes the malicious script 2/ Stored XSS This is for me, the most dangerous, the malicious code gets stored, e.g in your database and serves to every user who accesses the affected page. It's like a malicious land mine waiting to explode! Example scenario: ► Attacker posts a comment containing malicious script ► Your app stores it in the database ► Every user viewing the comments gets attacked 3/ DOM-based XSS The sneaky one, the vulnerability exists in client-side code that modifies the DOM. The malicious payload never reaches your server ! Example scenario: ► URL contains malicious code: `https://yourapp[.]com#` ► Client-side JavaScript uses this value unsafely ► Attacker exploits DOM manipulation Well, I was going to talk about more things, including possible mitigation strategies, but I can't include more than 4 images in one post, so I'll do it tomorrow 😉

558

1⃣0⃣ [PART 10] What Is Web Application Security ? Already number 10 🥳 Yesterday we talked about what a security audit / pentest is, today we're going to look at what you can expect from it, but also what you can ask for beforehand. What to Look for in a Pentesting Company ? You can ask for : ► Similar industry experience ► Case studies ► Sample reports ► Testing methodology Do not hesitate to ask for information on the testing methodology and favor a manual approach, if automated tools are used you can ask which ones, apart from the tools created internally, there is no secret to had about that What is a clear deliverables ? ► Detailed technical findings ► Business impact analysis ► Remediation guidance Also, the post-audit support is very important if you do not understand a vulnerability or cannot reproduce it, you must be able to obtain help from the company that discovered it. You can even ask if after the fix, the vulnerabilities can be re-checked, this is however not obligatory / not always included in the audit offer. Don't forget, security testing is an investment, not an expense. It's not just for big companies. Start small, but start now. A one-day audit is better than no audit, and regular testing shows you take security seriously. Remember: ► Every project needs security testing ► Start with a basic audit ► Build up to regular testing ► Clean reports are valuable ► Security is an ongoing journey Book that first security audit. Your future self (and your customers) will thank you !🚀

198

Most engaged tweets of Joshua

6⃣ [PART 6] What is Web Application Security ? I've observed that many of you have a SaaS that requires the user to provide a URL and a request is made to the website. But without the right practices, you're exposing yourself to a very dangerous vulnerability. Server-Side Request Forgery (SSRF) -------------------------------- An SSRF occurs when an attacker can make your server perform requests to unintended locations. It's like tricking your server into becoming a proxy to access internal services or private networks. There are several types of SSRF, but for this post we'll concentrate on the “basic” one. ► Your service requests a URL from the user ► The backend makes the request and displays the response Without protection, it is therefore possible to interrogate internal resources and retrieve sensitive information. It's even worse in cloud environments: on AWS, for example, it's possible to retrieve IAM credentials, and then it's party time for the attacker. Depending on the logic of the application and how the request is made, it's more or less complicated to prevent this. Possible defensive measures include : ► URL Validation and an allowlist ► Proper DNS Resolution ► Network-Level Protection ► Cloud Platform Specific Protections I wanted to include an example of what a good example looks like, but the code is 163 lines long, so instead, what I recommend is that you rely on a robust, well-proven SSRF protection library.

1k

7⃣ [PART 7] What Is Web Application Security ? Today, a vulnerability that without hesitation affects almost all of you which is also my favorite. I could do dozens of posts on this vulnerability, but I'll keep it brief. Broken Access Control ----------------------- Behind this barbaric name, there are actually several sub-categories of vulnerabilities, but in general, they affect everything related to authorization management. Why do I say it affects almost all of you ? Because even for experienced developers, it's a really complicated thing to implement, and it's something that's currently extremely poorly managed in LLM-generated code. So when I see a product with complex access control management, such as user/team management or multi-tenant, I smile in anticipation. The easiest example to illustrate in this category is IDOR (Insecure Direct Object Reference). It may not ring a bell, but a recent drama made a lot of noise about this vulnerability. A classic example: a user can access or modify another user's data by simply changing an ID in the URL or API request. And no, just using UUIDs instead of sequential IDs isn't enough protection ! Large companies such as Uber have paid the price for making this mistake. ► Always verify that the current user has permission to access the requested resource ► Implement proper authorization checks at EVERY endpoint ► Use role-based access control (RBAC) ► Don't rely solely on obscurity (like UUIDs) for security

147

1⃣ [PART 1] What is Web Application Security ? Hey, indie hackers friends! 👋 Let's talk about something that may not be the most exciting part of building your SaaS, but is absolutely crucial: web application security. Don't worry - I'll keep it simple and practical, focusing on what you really need to know as a solo founder or small team. ➡️Why Should You Care? Imagine the situation: You've just launched your SaaS after weeks of hard work. You get your first paying customers, things are looking good, and then... boom! Someone finds a security flaw and your users' data is exposed. Not only is this a technical nightmare, it can also destroy the trust you've worked so hard to build. As indie hackers, we often wear many hats and have to prioritize. Even if we don't need the same security configuration as a banking system, we absolutely must have the basics in place. ➡️What Exactly Is Web Application Security? Think of web application security as your home security system. Just as you want to protect your home from break-ins, you want to protect your web application from unauthorized access and attacks. Simply put, web application security is about ► Protecting your users' data (such as passwords and personal information) ► Ensuring that only authorized users can access certain functions ► Preventing attackers from breaking or misusing your application ► Maintain your users' trust and your reputation Tomorrow we'll take a look at the three core pillars of web security !

214

Thank you @zalkazemi, so valuable ! Like last week, it's easier for me to convert the video into text and then create an action plan, super easy to do with OpenAI Whisper

362

People with Analyst archetype

The Analyst
31 following12 followers
The Analyst
488 following56 followers
The Analyst

Licenciado en Contabilidad y Finanzas. Orgulloso de vivir en Bartolomé Masó Márquez, Granma, Cuba y de ser cubano 💯%.

66 following69 followers
The Analyst

fullstack engineer. ♥️ ai and blockchain. // Python · Laravel · Next.js · Solidity

2 following7 followers
The Analyst

Acesse o PortalLeodias.com

857 following2M followers
The Analyst

full-time option seller trying to generate regular income from the markets and logging his trades and market views.

140 following147 followers
The Analyst

Building portfolio of SaaS - Free calendar to see all subscriptions (Zuras.Online) (4 prev 🔴)

42 following41 followers
The Analyst

I grow YouTube channels. 10 billion+ views generated. 10+ years of experience. Worked w: @Jesser @MrBeast @RedBull & many more. Building a YouTube accelerator.

1k following114k followers
The Analyst

Researcher | The internet can be your lottery ticket or your prison sentence

381 following453 followers
The Analyst

📈💰 traderstats.app | Improve your trading 🛠️🧑‍💻 indiepa.ge/thealexporter

632 following128 followers

Explore Related Archetypes

If you enjoy the analyst profiles, you might also like these personality types:

Supercharge your 𝕏 game,
Grow with SuperX!

Get Started for Free