Missing security headers (CSP, HSTS, etc.) Exposing sensitive environment variables in logs No security testing in CI/CD pipeline Unencrypted database storage for PII Developers sharing passwords via Slack/email Ignoring security warnings in dependency scans “It works on my machine” response to security concerns Hardcoded credentials in source code SQL query without parameterized inputs API key exposed in a public repository No logging or monitoring for security events Unpatched critical vulnerability in production Lack of rate limiting on APIs Using eval() in production code Logging sensitive data in plaintext Disabled MFA on an admin account Default passwords still in use Open source library without a security review Lack of RBAC (everyone is an admin) Outdated dependency with known CVEs "We don’t have time for security" excuse Merging code with critical security issues Public S3 bucket with sensitive data No input validation on user input Missing security headers (CSP, HSTS, etc.) Exposing sensitive environment variables in logs No security testing in CI/CD pipeline Unencrypted database storage for PII Developers sharing passwords via Slack/email Ignoring security warnings in dependency scans “It works on my machine” response to security concerns Hardcoded credentials in source code SQL query without parameterized inputs API key exposed in a public repository No logging or monitoring for security events Unpatched critical vulnerability in production Lack of rate limiting on APIs Using eval() in production code Logging sensitive data in plaintext Disabled MFA on an admin account Default passwords still in use Open source library without a security review Lack of RBAC (everyone is an admin) Outdated dependency with known CVEs "We don’t have time for security" excuse Merging code with critical security issues Public S3 bucket with sensitive data No input validation on user input
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Missing security headers (CSP, HSTS, etc.)
Exposing sensitive environment variables in logs
No security testing in CI/CD pipeline
Unencrypted database storage for PII
Developers sharing passwords via Slack/email
Ignoring security warnings in dependency scans
“It works on my machine” response to security concerns
Hardcoded credentials in source code
SQL query without parameterized inputs
API key exposed in a public repository
No logging or monitoring for security events
Unpatched critical vulnerability in production
Lack of rate limiting on APIs
Using eval() in production code
Logging sensitive data in plaintext
Disabled MFA on an admin account
Default passwords still in use
Open source library without a security review
Lack of RBAC (everyone is an admin)
Outdated dependency with known CVEs
"We don’t have time for security" excuse
Merging code with critical security issues
Public S3 bucket with sensitive data
No input validation on user input