Skip to main content

ZeriFlow Journal

Security guides your team can ship this week

Actionable articles on TLS, headers, CSP, privacy, and practical hardening for modern web apps.

Tags

All#agencies#agency#alerting#alternatives#api-keys#api-security#api-automation#application-security#audit#automated-security#bfg-repo-cleaner#branch-protection#browser-security#check-security-headers#check-ssl-online#ci-cd-security-tools#ci-cd#clickjacking-protection#client-reports#cloud-security#code-scanning#code-security#comparison#compliance#content-security-policy#cookies#cors#cors-configuration#cron#csp#csp-directives#csp-header#csrf#cve#dangling-dns#database-security#dependabot#dependency-security#dependency-scanning#detectify-alternative#detectify-free-alternative#detectify-pricing-alternative#developer-security#developer-experience#developer-tools#devops#devops-security#devsecops#devsecops-tools#discord-webhook#dkim#dmarc#dns#dns-security#dnssec#ecommerce-security#ecommerce-site-security-checklist#email#email-authentication#email-security#express#frame-ancestors-csp#free-security-scan#free-ssl-check#free-website-security-scanner#freelance-security-audit#gdpr#git-security#gitguardian-alternative#github#github-actions#github-actions-security-tools#github-security#google-analytics#hardcoded-api-keys#hardcoded-secrets#headers#hsts#hsts-preload#http-headers-scanner-comparison#http-security-headers#http-strict-transport-security#httponly#https-configuration#improve-security#javascript-security#monitoring#mozilla-observatory-alternative#mozilla-observatory-tool#next-js#nextjs#next-js-security-tools#next-js-vulnerability-scanner#nextjs-app-router#nextjs-security-audit#nodejs#npm-audit#npm-cve#npm-vulnerabilities#npm-security#observatory-scanner#online-store-security#open-source#orm-security#owasp#owasp-2026#owasp-top-10#package-audit#parameterized-queries#payment-security#pci-dss#penetration-testing#pentest#permissions-policy#phishing-prevention#pipeline-security-scanner#pre-launch-security#preflight#prevent-clickjacking#privacy#pull-requests#rate-limiting#react#readme#redis#referrer-policy#repository-scanning#rest-api#saas-security-checklist#saas-security-tools#saas-security#samesite#sast-tools#secret-scanning#secrets-detection#secure-next-js-application#security-as-a-service-agency#security-audit#security-checklist#security-for-saas#security-headers#security-headers-checker-tool#security-headers-list#security-scan-tool#security-score#security-alerts#security-automation#security-badge#security-benchmark#security-gate#security-misconfiguration#security-monitoring#security-pipeline#security-reporting#security-scanner#security-scanning#securityheaders-com-alternative#server-security#session-security#shift-left-security#shift-left#shopify-security#slack-integration#snyk#spf#sql-injection#ssl-certificate-check#ssl-certificate-checker#ssl-check#ssl-checker-tool#ssl-security#startup-security-tools#startup-security#static-analysis#stripe#subdomain-takeover#supply-chain-security#supply-chain#tls#tls-1-3#tls-best-practices#tls-check-tool#tls-configuration#trufflehog#upsell-security-clients#vulnerability-assessment#vulnerability-detection#vulnerability-scanner#vulnerability-scan#web-agency-security-service#web-app-security#web-application-vulnerabilities#web-security#web-security-scanner#web-security-checklist#website-scanner-like-detectify#website-security#website-security-check-alternative#website-security-checklist#website-security-scanner#website-security-score#website-vulnerability-scanner#website-audit#website-monitoring#white-label#white-label-security#wordpress#x-frame-options#xss#xss-protection#xss-prevention
Web Security

XSS Prevention Guide for Developers: Modern Techniques in 2026

Apr 22, 2026·11 min

Cross-site scripting remains one of the most exploited vulnerabilities on the web. This guide covers all three XSS variants, vulnerable vs. secure code patterns, CSP as a second line of defense, and practical testing workflows.

#xss#xss-prevention#content-security-policy
Read article
Web Security

How to Improve Your Website Security Score: From 60 to 90+ in One Day

Apr 1, 2026·11 min

Most websites start their first security scan between 50 and 65 out of 100. Getting to 90+ is achievable in a single day if you know which fixes have the highest point impact. This guide walks through every major scoring category, the typical point cost of each failure, and the exact fix for each.

#security-score#website-security#security-headers
Read article
Web Security

How to Scan Your GitHub Repository for Security Vulnerabilities

Mar 31, 2026·9 min

Your GitHub repository is an attack surface — vulnerable dependencies, hardcoded secrets, and insecure code patterns all live there before they reach production. This guide covers every tool available for GitHub repository security scanning, from built-in features to advanced external tools.

#github-security#repository-scanning#dependabot
Read article
Web Security

How to Find and Remove Hardcoded API Keys from Your Codebase

Mar 30, 2026·10 min

Hardcoded API keys in source code are one of the most common and costly security mistakes in software development. This guide shows you how to find them with grep and automated tools, remove them from git history, and prevent them from appearing again.

#api-keys#secrets-detection#git-security
Read article
Web Security

How to Run a Website Security Audit: Step-by-Step Process

Mar 29, 2026·12 min

A website security audit does not need to be expensive or time-consuming if you follow a structured process. This step-by-step guide walks through everything from scope definition to remediation tracking, with the right tools for each phase.

#security-audit#web-security#vulnerability-assessment
Read article
Web Security

How to Set Up SPF, DKIM, and DMARC for Your Domain (Step by Step)

Mar 28, 2026·11 min

Missing email authentication records are one of the most common findings on security audits and the primary reason domains get spoofed for phishing. Setting up SPF, DKIM, and DMARC takes under an hour and dramatically reduces the risk of your domain being used in attacks.

#spf#dkim#dmarc
Read article
Web Security

How to Configure CORS Correctly in Node.js (Stop Using *)

Mar 27, 2026·10 min

Using a wildcard CORS policy is one of the most common security mistakes in Node.js APIs. This guide explains what CORS actually does, why * is dangerous when paired with credentials, and how to configure a secure origin allowlist.

#cors#nodejs#express
Read article
Web Security

How to Secure Cookies in Node.js: HttpOnly, Secure, and SameSite Explained

Mar 26, 2026·10 min

Insecure cookies are one of the most common and exploitable misconfigurations in Node.js web applications. Understanding and correctly setting HttpOnly, Secure, and SameSite is non-negotiable for any session-handling application.

#cookies#nodejs#express
Read article
Web Security

How to Configure CSP in Next.js Without Breaking Stripe or Google Analytics

Mar 25, 2026·11 min

Content Security Policy is the most powerful XSS defense available, but it is also the header most likely to break third-party integrations. This guide shows you how to build a strict CSP in Next.js that works with Stripe, Google Analytics, fonts, and more.

#csp#next-js#content-security-policy
Read article