Chapters:
Introduction 0:00
In case you missed it 2:10
Big List of Naughty Strings as a data file 4:55
Test your endpoints against the Big List of Naughty Strings 26:30
Community Shoutouts 1:08:20
In this video, Joyce and Arlemi look at how they can use the Big List of Naughty Strings to test how secure (or not!) are their endpoints before going to production.
ICYMI:
Protect Secret Keys in JAMstack Apps (with Joyce Lin): https://www.learnwithjason.dev/protec...
Shoutouts:
API Learner: https://explore.postman.com/templates...
Learn by API: https://explore.postman.com/templates...
Get notified when Postman streams live by following GetPostman on Twitch: / getpostman