Session

Unified Defense Against Injection Vulnerabilities

Injection attacks dominate the MITRE 2025 CWE Top 25—with XSS ranked #1, SQL injection #2, and OS command injection holding the highest count of CISA Known Exploited Vulnerabilities. Yet developers still juggle fragmented tools: one library for HTML sanitization, another for SQL, manual validation for paths and shell arguments. This context fragmentation creates gaps attackers exploit.

This session introduces go-safeinput, an open-source Go library providing unified, context-aware sanitization across all major injection categories through a single API. You will learn:

1. Why existing solutions fall short: Context fragmentation, lack of defense-in-depth, and supply-chain risks from excessive dependencies
2. The unified approach: One API that automatically applies the right sanitization for HTML, SQL identifiers, file paths, URL components, shell arguments, and deserialization
3. Real-world implementation: Live demonstration securing a vulnerable application against XSS, SQL injection, path traversal, command injection, and unsafe deserialization
4. Compliance alignment: How unified input validation supports NIST SP 800-53, CMMC, and federal security requirements

Whether you're building enterprise applications, federal systems, or open-source projects, you'll leave with practical techniques to reduce your injection vulnerability surface using defense-in-depth strategies that don't sacrifice developer productivity.

Ravi Sastry Kadali

Engineering Leader | Go Ecosystem Contributor | Security Tooling Author

Mountain View, California, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top