<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - German OWASP Day 2025 (low quality mp4)</title>
    <link>https://media.ccc.de/c/god2025</link>
    <description> This feed contains all events from god2025 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Sun, 01 Feb 2026 17:06:38 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/events/god/2025/logo.jpg</url>
      <title>Chaos Computer Club - German OWASP Day 2025 (low quality mp4)</title>
      <link>https://media.ccc.de/c/god2025</link>
    </image>
    <item>
      <title>Pwn My Ride: Jailbreaking Cars with CarPlay (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56485-pwn-my-ride-jailbreaking-c</link>
      <description>Apple CarPlay is a widely known protocol that connects smartphones to car multimedia systems. Based on AirPlay, CarPlay is installed in millions of cars, as it is supported by hundreds of car models from dozens of different manufacturers across the globe. In our talk, we will share how we managed to exploit all devices running CarPlay using a single vulnerability we discovered in the AirPlay SDK.
We&#39;ll take you through our entire exploit development process from identifying the vulnerability, to testing it on a custom device emulator, and finally, executing the exploit on actual devices.  The session will include a demonstration of our RCE exploit on a well known third-party CarPlay device to show how an attacker can run arbitrary code while in physical proximity to a target car.
We will also share how we managed to blindly exploit CarPlay without a debugger, knowing the vulnerable code is present on the system.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56485-eng-Pwn_My_Ride_Jailbreaking_Cars_with_CarPlay_sd.mp4"
        length="85983232"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56485-eng-Pwn_My_Ride_Jailbreaking_Cars_with_CarPlay_sd.mp4?1764169780</guid>
      <dc:identifier>93ba92ed-1e79-45e3-80a7-02f39db0f693</dc:identifier>
      <dc:date>2025-11-26T13:45:00+01:00</dc:date>
      <itunes:author>Avi Lumelsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56485, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Apple CarPlay is a widely known protocol that connects smartphones to car multimedia systems. Based on AirPlay, CarPlay is installed in millions of cars, as it is supported by hundreds of car models from dozens of different manufacturers across the globe. In our talk, we will share how we managed to exploit all devices running CarPlay using a single vulnerability we discovered in the AirPlay SDK.
We&#39;ll take you through our entire exploit development process from identifying the vulnerability, to testing it on a custom device emulator, and finally, executing the exploit on actual devices.  The session will include a demonstration of our RCE exploit on a well known third-party CarPlay device to show how an attacker can run arbitrary code while in physical proximity to a target car.
We will also share how we managed to blindly exploit CarPlay without a debugger, knowing the vulnerable code is present on the system.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:40:58</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56485-93ba92ed-1e79-45e3-80a7-02f39db0f693.jpg"/>
    </item>
    <item>
      <title>The Trust Trap - Security von Coding Assistants (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56491-the-trust-trap-security-vo</link>
      <description>Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?
Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über die aktuelle Studienlage und die Benchmarks zu den verschiedenen Modellen und diskutiert die Ergebnisse. Neben der Bedeutung von eingebrachten Schwachstellen im Code selbst werden Risiken wie Slopsquatting, Model Poisoning und Rules File Backdoors erläutert. Zuletzt gibt der Vortrag Empfehlungen zu Best Practices für die Nutzung von Coding Assistants: von der richtigen Konfiguration und Nutzung über Richtlinien zum Review und Testen von solchem Code.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56491-eng-The_Trust_Trap_-_Security_von_Coding_Assistants_sd.mp4"
        length="110100480"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 15:50:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56491-eng-The_Trust_Trap_-_Security_von_Coding_Assistants_sd.mp4?1764189909</guid>
      <dc:identifier>0a83a3f1-0f25-42c8-ae7a-7d06ea291672</dc:identifier>
      <dc:date>2025-11-26T15:50:00+01:00</dc:date>
      <itunes:author>Clemens Hübner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56491, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?
Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über die aktuelle Studienlage und die Benchmarks zu den verschiedenen Modellen und diskutiert die Ergebnisse. Neben der Bedeutung von eingebrachten Schwachstellen im Code selbst werden Risiken wie Slopsquatting, Model Poisoning und Rules File Backdoors erläutert. Zuletzt gibt der Vortrag Empfehlungen zu Best Practices für die Nutzung von Coding Assistants: von der richtigen Konfiguration und Nutzung über Richtlinien zum Review und Testen von solchem Code.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:43:05</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56491-0a83a3f1-0f25-42c8-ae7a-7d06ea291672.jpg"/>
    </item>
    <item>
      <title>Phishing for Passkeys: An Analysis of WebAuthn and CTAP (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56481-phishing-for-passkeys-an-a</link>
      <description>WebAuthn was supposed to replace 
                            swords on the web: uniform, secure, manageable authentication for everyone! One of its unique selling points was supposed to be the impossibility of phishing attacks. When passkeys were introduced, some of WebAuthn&#39;s security principles were watered down in order to achieve some usability improvements and thus reach more widespread adoption.
This presentation discusses the security of passkeys against phishing attacks. It explains the possibilities for an attacker to gain access to accounts secured with passkeys using spear phishing, and what conditions must be met for this to happen. It also practically demonstrates such an attack and discusses countermeasures.
Participants will learn which WebAuthn security principles still apply to passkeys and which do not. They will learn why passkeys are no longer completely phishing-proof and how they can evaluate this consideration for their own use of passkeys.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_sd.mp4"
        length="40894464"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 12:20:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_sd.mp4?1764164439</guid>
      <dc:identifier>ccc2f9a5-01b4-4482-bafd-fd86279a13d3</dc:identifier>
      <dc:date>2025-11-26T12:20:00+01:00</dc:date>
      <itunes:author>Michael Kuckuk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56481, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>WebAuthn was supposed to replace 
                            swords on the web: uniform, secure, manageable authentication for everyone! One of its unique selling points was supposed to be the impossibility of phishing attacks. When passkeys were introduced, some of WebAuthn&#39;s security principles were watered down in order to achieve some usability improvements and thus reach more widespread adoption.
This presentation discusses the security of passkeys against phishing attacks. It explains the possibilities for an attacker to gain access to accounts secured with passkeys using spear phishing, and what conditions must be met for this to happen. It also practically demonstrates such an attack and discusses countermeasures.
Participants will learn which WebAuthn security principles still apply to passkeys and which do not. They will learn why passkeys are no longer completely phishing-proof and how they can evaluate this consideration for their own use of passkeys.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:19:24</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56481-ccc2f9a5-01b4-4482-bafd-fd86279a13d3.jpg"/>
    </item>
    <item>
      <title>MCP security hot potato: how to stay secure integrating external tools to your LLM (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56487-mcp-security-hot-potato-ho</link>
      <description>Model Context Protocol (MCP) is the latest hot topic in cybersecurity. Business wants it (AI is the new mantra), developers are excited (new toys, new code), and security teams are left to make it safe—often with already packed schedules. Let&#39;s treat it like just another Tuesday. Like many shiny new technologies (remember the early days of cloud?), MCP is being built with a “features first, security later” mindset. As a fresh piece of tech, it blends novel vulnerabilities with familiar, well-known ones. If you&#39;re an early adopter, it&#39;s important to accept that MCP and its current implementations are imperfect—and to be ready for that. In this talk, we&#39;ll dive into the real-world challenges companies are facing with MCP and equip you with practical remediations.
 We&#39;ll cover topics such as:
                            
An introduction to the MCP protocol and its security considerations, including authentication
Emerging vulnerabilities like prompt injections, tool poisoning, rug pull attacks, and cross-server tool shadowing
Classic vulnerabilities that may resurface around MCP, based on recent CVEs
Remediation strategies and available tooling

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56487-eng-MCP_security_hot_potato_how_to_stay_secure_integrating_external_tools_to_your_LLM_sd.mp4"
        length="57671680"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56487-eng-MCP_security_hot_potato_how_to_stay_secure_integrating_external_tools_to_your_LLM_sd.mp4?1764170493</guid>
      <dc:identifier>591309e4-b4c7-4ecc-9667-efe5d34c8f2c</dc:identifier>
      <dc:date>2025-11-26T14:30:00+01:00</dc:date>
      <itunes:author>Mateusz Olejarka, Dawid Nastaj</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56487, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Model Context Protocol (MCP) is the latest hot topic in cybersecurity. Business wants it (AI is the new mantra), developers are excited (new toys, new code), and security teams are left to make it safe—often with already packed schedules. Let&#39;s treat it like just another Tuesday. Like many shiny new technologies (remember the early days of cloud?), MCP is being built with a “features first, security later” mindset. As a fresh piece of tech, it blends novel vulnerabilities with familiar, well-known ones. If you&#39;re an early adopter, it&#39;s important to accept that MCP and its current implementations are imperfect—and to be ready for that. In this talk, we&#39;ll dive into the real-world challenges companies are facing with MCP and equip you with practical remediations.
 We&#39;ll cover topics such as:
                            
An introduction to the MCP protocol and its security considerations, including authentication
Emerging vulnerabilities like prompt injections, tool poisoning, rug pull attacks, and cross-server tool shadowing
Classic vulnerabilities that may resurface around MCP, based on recent CVEs
Remediation strategies and available tooling

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:38</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56487-591309e4-b4c7-4ecc-9667-efe5d34c8f2c.jpg"/>
    </item>
    <item>
      <title>Extract: A PHP Foot-Gun Case Study (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56486-extract-a-php-foot-gun-cas</link>
      <description>Do you always read the documentation before using a function in your languages&#39; standard library? This talk explores the attack surface of a special feature in PHP which is easy to misuse with unforseen consequences. The `extract` function allows to replace the value of local variables named after the keys in an array. Calling it with user-controlled input allows the attacker to change arbitrary variables in the program. The documentation warns against the dangers of using it with untrusted data, but our large-scale analysis on 28.325 PHP projects from GitHub shows, that this warning is ignored.
The talk walks through the process of identifing `extract`-based vulnerabilities and how they might have ended up the way they are by looking at the surrounding code. After introducing different levels of attacker-control guided by concrete exploits, listeners gain an intuition on what to look out for while reviewing code.
Attending this talk, the audience will learn:

Rich ways users have control over input in PHP.
How to exploit insecure calls to `extract` given multiple real-world case-studies from the dataset of open source projects from GitHub.
Tips on how to avoid this and similar threats in new and legacy code.
Possible changes to PHP itself for risk reduction.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56486-eng-Extract_A_PHP_Foot-Gun_Case_Study_sd.mp4"
        length="47185920"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56486-eng-Extract_A_PHP_Foot-Gun_Case_Study_sd.mp4?1764169966</guid>
      <dc:identifier>69326d17-20c7-4993-a8e1-3d3fa7c26b1f</dc:identifier>
      <dc:date>2025-11-26T14:30:00+01:00</dc:date>
      <itunes:author>Jannik Hartung, Martin Johns, Simon Koch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56486, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Do you always read the documentation before using a function in your languages&#39; standard library? This talk explores the attack surface of a special feature in PHP which is easy to misuse with unforseen consequences. The `extract` function allows to replace the value of local variables named after the keys in an array. Calling it with user-controlled input allows the attacker to change arbitrary variables in the program. The documentation warns against the dangers of using it with untrusted data, but our large-scale analysis on 28.325 PHP projects from GitHub shows, that this warning is ignored.
The talk walks through the process of identifing `extract`-based vulnerabilities and how they might have ended up the way they are by looking at the surrounding code. After introducing different levels of attacker-control guided by concrete exploits, listeners gain an intuition on what to look out for while reviewing code.
Attending this talk, the audience will learn:

Rich ways users have control over input in PHP.
How to exploit insecure calls to `extract` given multiple real-world case-studies from the dataset of open source projects from GitHub.
Tips on how to avoid this and similar threats in new and legacy code.
Possible changes to PHP itself for risk reduction.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:37</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56486-69326d17-20c7-4993-a8e1-3d3fa7c26b1f.jpg"/>
    </item>
    <item>
      <title>OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56494-owasp-top-102025-aktuelle</link>
      <description>Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56494-deu-OWASP_Top_102025_Aktuelle_Informationen_und_Insights_zum_Projekt_sd.mp4"
        length="27262976"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 17:05:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56494-deu-OWASP_Top_102025_Aktuelle_Informationen_und_Insights_zum_Projekt_sd.mp4?1764190375</guid>
      <dc:identifier>f9291c47-6a2d-4ad3-8fff-36877a8684c4</dc:identifier>
      <dc:date>2025-11-26T17:05:00+01:00</dc:date>
      <itunes:author>Torsten Gigler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56494, 2025, god2025, Track 1, god2025-deu, god2025, Day 1</itunes:keywords>
      <itunes:summary>Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:11:10</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56494-f9291c47-6a2d-4ad3-8fff-36877a8684c4.jpg"/>
    </item>
    <item>
      <title>Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56492-der-cyber-resilience-act-w</link>
      <description>Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwares laufen, als auch reine Softwareprodukte. Die Anforderungen an die Software-Hersteller erstrecken sich von grundsätzlichem „Security by Design“ und „Secure by Default“, über Bedrohungsanalysen der Software bis hin zu verpflichtendem Patching und Schwachstellenmanagement.
Die Themen klingen irgendwie familiär? Kein Wunder, denn eine ganze Reihe von Projekten aus dem OWASP-Ökosystem sind geradezu prädestiniert zum Einsatz im Kontext des CRAs. Nicht nur, dass mit CycloneDX einer der zwei de-facto SBOM-Standards aus OWASP heraus entstanden ist - auch Frameworks wie OWASP SAMM oder Tools wie Dependency-Track können ganz entscheidende Rollen für die Umsetzung von Supply-Chain-Security und SDLC-Prozessen spielen.
In diesem Talk schauen wir uns die Anforderungen der Verordnung genauer an und blicken dann auf Schnittstellen zu OWASP-Projekten. Dies soll am Ende helfen, sowohl für die Seite der Hersteller ein besseres Bild für OWASP zu erzeugen, als auch von OWASP-Seite aus zielgenauer auf CRA-Verpflichtete zugehen zu können. Je mehr Menschen sich in den Themen wiederfinden und Zusammenarbeit entstehen kann, desto besser.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56492-deu-Der_Cyber_Resilience_Act_Wie_OWASP_fuer_die_Software-Hersteller_eine_entscheidende_Rolle_spielen_kann_sd.mp4"
        length="44040192"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 16:35:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56492-deu-Der_Cyber_Resilience_Act_Wie_OWASP_fuer_die_Software-Hersteller_eine_entscheidende_Rolle_spielen_kann_sd.mp4?1764190127</guid>
      <dc:identifier>fa9e001a-77f8-4a85-81c1-5decbc29a54e</dc:identifier>
      <dc:date>2025-11-26T16:35:00+01:00</dc:date>
      <itunes:author>Dominik Pataky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56492, 2025, god2025, Track 1, god2025-deu, god2025, Day 1</itunes:keywords>
      <itunes:summary>Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwares laufen, als auch reine Softwareprodukte. Die Anforderungen an die Software-Hersteller erstrecken sich von grundsätzlichem „Security by Design“ und „Secure by Default“, über Bedrohungsanalysen der Software bis hin zu verpflichtendem Patching und Schwachstellenmanagement.
Die Themen klingen irgendwie familiär? Kein Wunder, denn eine ganze Reihe von Projekten aus dem OWASP-Ökosystem sind geradezu prädestiniert zum Einsatz im Kontext des CRAs. Nicht nur, dass mit CycloneDX einer der zwei de-facto SBOM-Standards aus OWASP heraus entstanden ist - auch Frameworks wie OWASP SAMM oder Tools wie Dependency-Track können ganz entscheidende Rollen für die Umsetzung von Supply-Chain-Security und SDLC-Prozessen spielen.
In diesem Talk schauen wir uns die Anforderungen der Verordnung genauer an und blicken dann auf Schnittstellen zu OWASP-Projekten. Dies soll am Ende helfen, sowohl für die Seite der Hersteller ein besseres Bild für OWASP zu erzeugen, als auch von OWASP-Seite aus zielgenauer auf CRA-Verpflichtete zugehen zu können. Je mehr Menschen sich in den Themen wiederfinden und Zusammenarbeit entstehen kann, desto besser.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:12</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56492-fa9e001a-77f8-4a85-81c1-5decbc29a54e.jpg"/>
    </item>
    <item>
      <title>The Automation Illusion? What Machines Can&#39;t Do in Threat Modeling (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56484-the-automation-illusion-wh</link>
      <description>Threat modeling stands at a critical juncture. While essential for creating secure systems, it remains mostly manual, handcrafted, and often too slow for today&#39;s development cycles. At the same time, automation and AI offer new levels of speed and scalability— but how much can we rely on them?
This talk explores the tension between automation and human expertise in threat modeling. We&#39;ll dissect the traditional threat modeling process—scoping, modeling, threat identification, risk analysis, and mitigation—and perform a step-by-step gap analysis to identify what can realistically be automated today, what cannot, and why.
We&#39;ll dive into:

Current tooling: Review the AI threat modeling tools that handle diagram-based automation, template-driven modeling, risk scoring, and pattern matching.
Emerging AI use cases: automatically generating threat models from architecture diagrams, user stories, or use case descriptions; providing AI-assisted mitigation suggestions; and conducting NLP-driven threat analysis.
Limitations and risks: False confidence, hallucinations, model bias, ethical accountability, and the challenge of modeling new or context-specific threats.

We will ground this analysis with examples from organizations and academic research that aim to scale threat modeling without compromising depth or quality, drawing parallels to how other activities, such as SAST and DAST scanning, evolved.
Attendees will walk away with a practical roadmap for integrating automation without undermining the human insight threat modeling still requires.
This talk isn&#39;t a tool pitch. It&#39;s a candid, experience-based view of where automation can meaningfully accelerate threat modeling—and where the human must remain firmly in the loop.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56484-eng-The_Automation_Illusion_What_Machines_Cant_Do_in_Threat_Modeling_sd.mp4"
        length="103809024"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56484-eng-The_Automation_Illusion_What_Machines_Cant_Do_in_Threat_Modeling_sd.mp4?1764168046</guid>
      <dc:identifier>10ffd66f-86de-4021-8f69-c9cedc94a3f8</dc:identifier>
      <dc:date>2025-11-26T13:45:00+01:00</dc:date>
      <itunes:author>Sebastian Deleersnyder, Georges Bolssens</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56484, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Threat modeling stands at a critical juncture. While essential for creating secure systems, it remains mostly manual, handcrafted, and often too slow for today&#39;s development cycles. At the same time, automation and AI offer new levels of speed and scalability— but how much can we rely on them?
This talk explores the tension between automation and human expertise in threat modeling. We&#39;ll dissect the traditional threat modeling process—scoping, modeling, threat identification, risk analysis, and mitigation—and perform a step-by-step gap analysis to identify what can realistically be automated today, what cannot, and why.
We&#39;ll dive into:

Current tooling: Review the AI threat modeling tools that handle diagram-based automation, template-driven modeling, risk scoring, and pattern matching.
Emerging AI use cases: automatically generating threat models from architecture diagrams, user stories, or use case descriptions; providing AI-assisted mitigation suggestions; and conducting NLP-driven threat analysis.
Limitations and risks: False confidence, hallucinations, model bias, ethical accountability, and the challenge of modeling new or context-specific threats.

We will ground this analysis with examples from organizations and academic research that aim to scale threat modeling without compromising depth or quality, drawing parallels to how other activities, such as SAST and DAST scanning, evolved.
Attendees will walk away with a practical roadmap for integrating automation without undermining the human insight threat modeling still requires.
This talk isn&#39;t a tool pitch. It&#39;s a candid, experience-based view of where automation can meaningfully accelerate threat modeling—and where the human must remain firmly in the loop.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:39:58</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56484-10ffd66f-86de-4021-8f69-c9cedc94a3f8.jpg"/>
    </item>
    <item>
      <title>From Startup to Scale: Choosing the Right AppSec Path (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56475-from-startup-to-scale-choo</link>
      <description>Security teams often inherit their organisation&#39;s structure - for better or worse. The way you design your AppSec programme and choose your team topology can determine whether security becomes a trusted enabler or a frustrating bottleneck.
In this story-driven session, we follow Alex, who begins as the only security person in a 50-person startup. At first, Alex builds a centralised AppSec team, finding it effective for control but slow to scale. As the company grows to hundreds of employees, bottlenecks appear, and burnout looms. Alex experiments with embedded security engineers, Security as a Platform, and a Security Champions network, learning the trade-offs of each approach along the way.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56475-eng-From_Startup_to_Scale_Choosing_the_Right_AppSec_Path_sd.mp4"
        length="60817408"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 10:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56475-eng-From_Startup_to_Scale_Choosing_the_Right_AppSec_Path_sd.mp4?1764162651</guid>
      <dc:identifier>b62e489d-ccc9-4d8b-b9b4-d92b4c27337d</dc:identifier>
      <dc:date>2025-11-26T10:15:00+01:00</dc:date>
      <itunes:author>Javan Rasokat, Vanessa Sutter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56475, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Security teams often inherit their organisation&#39;s structure - for better or worse. The way you design your AppSec programme and choose your team topology can determine whether security becomes a trusted enabler or a frustrating bottleneck.
In this story-driven session, we follow Alex, who begins as the only security person in a 50-person startup. At first, Alex builds a centralised AppSec team, finding it effective for control but slow to scale. As the company grows to hundreds of employees, bottlenecks appear, and burnout looms. Alex experiments with embedded security engineers, Security as a Platform, and a Security Champions network, learning the trade-offs of each approach along the way.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:17</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56475-b62e489d-ccc9-4d8b-b9b4-d92b4c27337d.jpg"/>
    </item>
    <item>
      <title>How the EU created Electronic Invoices without considering Security (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56476-how-the-eu-created-electro</link>
      <description>Companies within the European Union are increasingly required to be able to issue and process electronic invoices according to EU standards. For example, since January 2025, companies in Germany have been required to support electronic invoices in B2B contexts.
While it is desirable to standardize invoice data formats, the EU standards have severe problems. They are overly and needlessly complicated, and security was not given much consideration. An unfortunate design choice to use a problematic &quot;standard&quot; (XSLT 2/3) only supported by a single implementation with inherent security problems makes security vulnerabilities in electronic invoicing software even more likely.
The EU standard allows multiple redundant XML data formats to encode electronic invoices. XML processing has several well-known, inherent security problems, most notably file exfiltration via XML eXternal Entity (XXE) attacks.
It appears that XML security was not considered during the creation of these standards. Neither the standardization documents nor the information found on various government and EU web pages contain any information about avoiding XML security flaws.
Therefore, unsurprisingly, security vulnerabilities in software processing these electronic invoices are very common.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56476-eng-How_the_EU_created_Electronic_Invoices_without_considering_Security_sd.mp4"
        length="66060288"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 10:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56476-eng-How_the_EU_created_Electronic_Invoices_without_considering_Security_sd.mp4?1764161604</guid>
      <dc:identifier>7d2530a7-3b5e-44a6-8297-8d3a7abf99eb</dc:identifier>
      <dc:date>2025-11-26T10:15:00+01:00</dc:date>
      <itunes:author>Hanno Böck</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56476, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Companies within the European Union are increasingly required to be able to issue and process electronic invoices according to EU standards. For example, since January 2025, companies in Germany have been required to support electronic invoices in B2B contexts.
While it is desirable to standardize invoice data formats, the EU standards have severe problems. They are overly and needlessly complicated, and security was not given much consideration. An unfortunate design choice to use a problematic &quot;standard&quot; (XSLT 2/3) only supported by a single implementation with inherent security problems makes security vulnerabilities in electronic invoicing software even more likely.
The EU standard allows multiple redundant XML data formats to encode electronic invoices. XML processing has several well-known, inherent security problems, most notably file exfiltration via XML eXternal Entity (XXE) attacks.
It appears that XML security was not considered during the creation of these standards. Neither the standardization documents nor the information found on various government and EU web pages contain any information about avoiding XML security flaws.
Therefore, unsurprisingly, security vulnerabilities in software processing these electronic invoices are very common.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:51</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56476-7d2530a7-3b5e-44a6-8297-8d3a7abf99eb.jpg"/>
    </item>
    <item>
      <title>OWASP Cumulus: Threat Modeling the Ops of DevOps (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56482-owasp-cumulus-threat-model</link>
      <description>In this presentation, we will highlight how threat modeling, as a proactive measure, can increase security in DevOps projects.
We will introduce OWASP Cumulus, a threat modeling card game designed for threat modeling the Ops part of DevOps processes. This game (in combination with similar games like Elevation of Privilege or OWASP Cornucopia) enables DevOps teams to take the security responsibility for their project in a lightweight and engaging way.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56482-eng-OWASP_Cumulus_Threat_Modeling_the_Ops_of_DevOps_sd.mp4"
        length="73400320"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 12:20:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56482-eng-OWASP_Cumulus_Threat_Modeling_the_Ops_of_DevOps_sd.mp4?1764164728</guid>
      <dc:identifier>bd3aa5dd-5842-4971-be51-11b48a56002f</dc:identifier>
      <dc:date>2025-11-26T12:20:00+01:00</dc:date>
      <itunes:author>Christoph Niehoff</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56482, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>In this presentation, we will highlight how threat modeling, as a proactive measure, can increase security in DevOps projects.
We will introduce OWASP Cumulus, a threat modeling card game designed for threat modeling the Ops part of DevOps processes. This game (in combination with similar games like Elevation of Privilege or OWASP Cornucopia) enables DevOps teams to take the security responsibility for their project in a lightweight and engaging way.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:08</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56482-bd3aa5dd-5842-4971-be51-11b48a56002f.jpg"/>
    </item>
    <item>
      <title>A CISO&#39;s Adventures in AI Wonderland (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56490-a-cisos-adventures-in-ai-w</link>
      <description>As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice&#39;s adventures in Wonderland.
Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to explain why &quot;AI security Armageddon&quot; is looming... and that is just the security part of the story. All other areas in your organization are heavily using or experimenting with AI (e.g., vibe coding, automation, decision making, etc.), challenging (or ignoring) established security practices.
This talk tells the story of the daily experience of dealing with AI as a CISO in a cloud-application startup. Which experiments failed or were successful, which advice is helpful, what is difficult to apply in practice, which questions are still open...
The motivation for this talk is to start a conversation among security experts on how we can shape a secure AI future and not get pushed into the role of being seen as &quot;hindering&quot; AI progress.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56490-eng-A_CISOs_Adventures_in_AI_Wonderland_sd.mp4"
        length="138412032"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 15:50:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56490-eng-A_CISOs_Adventures_in_AI_Wonderland_sd.mp4?1764190003</guid>
      <dc:identifier>c2cff574-070b-48c0-ae1d-65967952bee5</dc:identifier>
      <dc:date>2025-11-26T15:50:00+01:00</dc:date>
      <itunes:author>Holger Mack</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56490, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice&#39;s adventures in Wonderland.
Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to explain why &quot;AI security Armageddon&quot; is looming... and that is just the security part of the story. All other areas in your organization are heavily using or experimenting with AI (e.g., vibe coding, automation, decision making, etc.), challenging (or ignoring) established security practices.
This talk tells the story of the daily experience of dealing with AI as a CISO in a cloud-application startup. Which experiments failed or were successful, which advice is helpful, what is difficult to apply in practice, which questions are still open...
The motivation for this talk is to start a conversation among security experts on how we can shape a secure AI future and not get pushed into the role of being seen as &quot;hindering&quot; AI progress.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:22</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56490-c2cff574-070b-48c0-ae1d-65967952bee5.jpg"/>
    </item>
    <item>
      <title>News from the Juice Shop ecosystem (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56495-news-from-the-juice-shop-e</link>
      <description>OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a common stack for testing and code linting.
But the team did not only clean up and refactor behind the scenes. There are also lots of exciting new features and enhancements available, such as:

Several new hacking challenges, e.g. a YAML memory bomb attack and an API key leakage
Enhancing MultiJuicer&#39;s team score board to deliver a more holistic CTF experience
Reimagining the hint system for all challenges, integrating now even better with CTF servers and making the use of hints more explicit for users

Of course the popular Juice Shop Success Pyramid™ will be back with beyond-crazy Docker image download stats and other usage figures!

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56495-eng-News_from_the_Juice_Shop_ecosystem_sd.mp4"
        length="67108864"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56495-eng-News_from_the_Juice_Shop_ecosystem_sd.mp4?1764190464</guid>
      <dc:identifier>402cfa63-18e2-4c55-945d-e564437c0807</dc:identifier>
      <dc:date>2025-11-26T17:15:00+01:00</dc:date>
      <itunes:author>Björn Kimminich</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56495, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a common stack for testing and code linting.
But the team did not only clean up and refactor behind the scenes. There are also lots of exciting new features and enhancements available, such as:

Several new hacking challenges, e.g. a YAML memory bomb attack and an API key leakage
Enhancing MultiJuicer&#39;s team score board to deliver a more holistic CTF experience
Reimagining the hint system for all challenges, integrating now even better with CTF servers and making the use of hints more explicit for users

Of course the popular Juice Shop Success Pyramid™ will be back with beyond-crazy Docker image download stats and other usage figures!

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:22:36</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56495-402cfa63-18e2-4c55-945d-e564437c0807.jpg"/>
    </item>
    <item>
      <title>Continuous Vulnerability Scanning with OWASP secureCodeBox (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56480-continuous-vulnerability-s</link>
      <description>The OWASP secureCodeBox project aims to provide a unified way to run and automate open-source scanning tools like nmap, nuclei, zap, ssh-audit, and sslyze to continuously scan the code and infrastructure of entire organizations.
This allows setting up automated scans that will regularly scan internal networks and internet-facing systems for vulnerabilities. The SCB also allows defining rules to automatically start more in-depth scans based on previous findings, e.g., to start a specialized SSH scan if a port scan discovers an open SSH port.
Scan results can be uniformly handled with prebuilt hooks, e.g. to send out alerts via messaging tools, or to ingest the findings into vulnerability management systems like OWASP DefectDojo.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56480-eng-Continuous_Vulnerability_Scanning_with_OWASP_secureCodeBox_sd.mp4"
        length="63963136"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 11:55:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56480-eng-Continuous_Vulnerability_Scanning_with_OWASP_secureCodeBox_sd.mp4?1764163774</guid>
      <dc:identifier>03b7a38c-7228-4752-b714-846f0c41d36c</dc:identifier>
      <dc:date>2025-11-26T11:55:00+01:00</dc:date>
      <itunes:author>Jannik Hollenbach</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56480, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>The OWASP secureCodeBox project aims to provide a unified way to run and automate open-source scanning tools like nmap, nuclei, zap, ssh-audit, and sslyze to continuously scan the code and infrastructure of entire organizations.
This allows setting up automated scans that will regularly scan internal networks and internet-facing systems for vulnerabilities. The SCB also allows defining rules to automatically start more in-depth scans based on previous findings, e.g., to start a specialized SSH scan if a port scan discovers an open SSH port.
Scan results can be uniformly handled with prebuilt hooks, e.g. to send out alerts via messaging tools, or to ingest the findings into vulnerability management systems like OWASP DefectDojo.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:21</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56480-03b7a38c-7228-4752-b714-846f0c41d36c.jpg"/>
    </item>
    <item>
      <title>Introducing Passkeys - Strategies and Challenges for Developers (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56479-introducing-passkeys-strat</link>
      <description>The future of authentication is passwordless - Passkeys are the key technology. This talk supports developers in implementing Passkeys in their organizations and helps with the decision between in-house development, SDK, or Passkey-as-a-Service solutions. You will learn how to design recovery flows and fallback mechanisms in a user-friendly way, how Passkeys can be securely shared across devices and platforms, and what level of security they offer compared to traditional methods. Practical user stories and concrete examples highlight common pitfalls and help you optimally communicate the benefits of Passkeys.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56479-eng-Introducing_Passkeys_-_Strategies_and_Challenges_for_Developers_sd.mp4"
        length="51380224"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 11:55:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56479-eng-Introducing_Passkeys_-_Strategies_and_Challenges_for_Developers_sd.mp4?1764163922</guid>
      <dc:identifier>90b1b8de-07c2-4937-a9d0-f53fd96595a1</dc:identifier>
      <dc:date>2025-11-26T11:55:00+01:00</dc:date>
      <itunes:author>Clemens Hübner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56479, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>The future of authentication is passwordless - Passkeys are the key technology. This talk supports developers in implementing Passkeys in their organizations and helps with the decision between in-house development, SDK, or Passkey-as-a-Service solutions. You will learn how to design recovery flows and fallback mechanisms in a user-friendly way, how Passkeys can be securely shared across devices and platforms, and what level of security they offer compared to traditional methods. Practical user stories and concrete examples highlight common pitfalls and help you optimally communicate the benefits of Passkeys.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:22:18</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56479-90b1b8de-07c2-4937-a9d0-f53fd96595a1.jpg"/>
    </item>
    <item>
      <title>Keynote: Code Dark Age (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56472-keynote-code-dark-age</link>
      <description>Generative AI is supposed to make our lives easier. But what if it&#39;s really just coding us straight into a new Dark Age? We hand over our systems to AI agents, only to watch them invent backdoors nobody asked for. Developers are left with the glamorous job of bug janitors, while attackers get new exploits. It&#39;s hard not to feel like we are front-row spectators to the collapse of digital civilization. This talk shows how these risks are multiplying, and how the public debate around security often misses the point, making it even harder to fix what is broken. Maybe what we are really witnessing is the world&#39;s biggest live demo of the digital apocalypse. But sometimes you have to watch everything burn down before you can rebuild it better.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56472-eng-Keynote_Code_Dark_Age_sd.mp4"
        length="103809024"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 09:05:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56472-eng-Keynote_Code_Dark_Age_sd.mp4?1764153983</guid>
      <dc:identifier>5cee4aae-a611-484a-9706-27fd2e6a9f4a</dc:identifier>
      <dc:date>2025-11-26T09:05:00+01:00</dc:date>
      <itunes:author>Eva Wolfangel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56472, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Generative AI is supposed to make our lives easier. But what if it&#39;s really just coding us straight into a new Dark Age? We hand over our systems to AI agents, only to watch them invent backdoors nobody asked for. Developers are left with the glamorous job of bug janitors, while attackers get new exploits. It&#39;s hard not to feel like we are front-row spectators to the collapse of digital civilization. This talk shows how these risks are multiplying, and how the public debate around security often misses the point, making it even harder to fix what is broken. Maybe what we are really witnessing is the world&#39;s biggest live demo of the digital apocalypse. But sometimes you have to watch everything burn down before you can rebuild it better.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:39:37</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56472-5cee4aae-a611-484a-9706-27fd2e6a9f4a.jpg"/>
    </item>
    <item>
      <title>LangSec for AppSec folks (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56477-langsec-for-appsec-folks</link>
      <description>Die von LangSec beschrieben grundlegenden Sicherheitsprinzipien erklären die Hauptursachen vieler Sicherheitslücken und wie man diese beheben kann. LangSec sieht die anhaltende Schwachstellen-Epidemie in Software als eine Folge der ad-hock Entwicklung von Code, der Ein- und Ausgaben verarbeitet. Gemäß LangSec besteht der Schlüssel zur Entwicklung vertrauenswürdiger Software, die mit potenziell bösartigen Eingaben korrekt umgeht, darin alle gültigen oder erwarteten Eingaben und Ausgaben als formale Sprache zu behandeln. Dementsprechend müssen die Routinen zur Verarbeitung von Eingaben und Ausgaben als Parser beziehungsweise Unparser für diese Sprache behandelt werden und auch dementsprechend entwickelt werden. In diesem Vortrag möchte ich LangSec und die Implikationen für unsere tägliche Arbeit in AppSec vorstellen ohne in die Tiefen der Theoretischen Informatik und des Compilerbaus abzudriften.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56477-eng-LangSec_for_AppSec_folks_sd.mp4"
        length="68157440"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 11:10:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56477-eng-LangSec_for_AppSec_folks_sd.mp4?1764161890</guid>
      <dc:identifier>b873d52c-a991-4a71-93aa-f1564620c209</dc:identifier>
      <dc:date>2025-11-26T11:10:00+01:00</dc:date>
      <itunes:author>Lars Hermerschmidt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56477, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Die von LangSec beschrieben grundlegenden Sicherheitsprinzipien erklären die Hauptursachen vieler Sicherheitslücken und wie man diese beheben kann. LangSec sieht die anhaltende Schwachstellen-Epidemie in Software als eine Folge der ad-hock Entwicklung von Code, der Ein- und Ausgaben verarbeitet. Gemäß LangSec besteht der Schlüssel zur Entwicklung vertrauenswürdiger Software, die mit potenziell bösartigen Eingaben korrekt umgeht, darin alle gültigen oder erwarteten Eingaben und Ausgaben als formale Sprache zu behandeln. Dementsprechend müssen die Routinen zur Verarbeitung von Eingaben und Ausgaben als Parser beziehungsweise Unparser für diese Sprache behandelt werden und auch dementsprechend entwickelt werden. In diesem Vortrag möchte ich LangSec und die Implikationen für unsere tägliche Arbeit in AppSec vorstellen ohne in die Tiefen der Theoretischen Informatik und des Compilerbaus abzudriften.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:29:24</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56477-b873d52c-a991-4a71-93aa-f1564620c209.jpg"/>
    </item>
    <item>
      <title>Welcome (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56471-welcome</link>
      <description>Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56471-eng-Welcome_sd.mp4"
        length="55574528"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 09:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56471-eng-Welcome_sd.mp4?1764146887</guid>
      <dc:identifier>7c1d0211-0a19-470e-9081-be1966ecc4bf</dc:identifier>
      <dc:date>2025-11-26T09:00:00+01:00</dc:date>
      <itunes:author>OWASP German Chapter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56471, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:09:21</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56471-7c1d0211-0a19-470e-9081-be1966ecc4bf.jpg"/>
    </item>
    <item>
      <title>YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56493-yurascanner-leveraging-llm</link>
      <description>Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresses this limitation by introducing YuraScanner, a task-driven web application scanner that leverages large-language models (LLMs) to autonomously execute tasks and workflows.
YuraScanner operates as a goal-based agent, suggesting actions to achieve predefined objectives by processing webpages to extract semantic information. Unlike traditional methods that rely on user-provided traces, YuraScanner uses LLMs to bridge the semantic gap, making it web application-agnostic. Using the XSS engine of Black Widow, YuraScanner tests discovered input points for vulnerabilities, enhancing the scanning process&#39;s comprehensiveness and accuracy.
We evaluated YuraScanner on 20 diverse web applications, focusing on task extraction, execution accuracy, and vulnerability detection. The results demonstrate YuraScanner&#39;s superiority in discovering new attack surfaces and deeper states, significantly improving vulnerability detection. Notably, YuraScanner identified 12 unique zero-day XSS vulnerabilities, compared to three by Black Widow. This study highlights YuraScanner&#39;s potential to revolutionize web application scanning with its automated, task-driven approach.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56493-eng-YuraScanner_Leveraging_LLMs_for_Task-driven_Web_App_Scanning_sd.mp4"
        length="50331648"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 16:35:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56493-eng-YuraScanner_Leveraging_LLMs_for_Task-driven_Web_App_Scanning_sd.mp4?1764190249</guid>
      <dc:identifier>17d6ccbe-6241-4c2e-b223-d6d6514d7374</dc:identifier>
      <dc:date>2025-11-26T16:35:00+01:00</dc:date>
      <itunes:author>Aleksei Stafeev</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56493, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresses this limitation by introducing YuraScanner, a task-driven web application scanner that leverages large-language models (LLMs) to autonomously execute tasks and workflows.
YuraScanner operates as a goal-based agent, suggesting actions to achieve predefined objectives by processing webpages to extract semantic information. Unlike traditional methods that rely on user-provided traces, YuraScanner uses LLMs to bridge the semantic gap, making it web application-agnostic. Using the XSS engine of Black Widow, YuraScanner tests discovered input points for vulnerabilities, enhancing the scanning process&#39;s comprehensiveness and accuracy.
We evaluated YuraScanner on 20 diverse web applications, focusing on task extraction, execution accuracy, and vulnerability detection. The results demonstrate YuraScanner&#39;s superiority in discovering new attack surfaces and deeper states, significantly improving vulnerability detection. Notably, YuraScanner identified 12 unique zero-day XSS vulnerabilities, compared to three by Black Widow. This study highlights YuraScanner&#39;s potential to revolutionize web application scanning with its automated, task-driven approach.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:22:08</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56493-17d6ccbe-6241-4c2e-b223-d6d6514d7374.jpg"/>
    </item>
    <item>
      <title>The Surprising Complexity of Finding Known Vulnerabilities (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56473-the-surprising-complexity</link>
      <description>With the increasing reliance on third-party software components, ensuring their security against known vulnerabilities has become a daily challenge for individuals and organizations. Despite the availability of a variety of tools and databases, we found all of them fall
                            short when applied to real-world scenarios - raising questions about their effectiveness, generalizability, and practical utility.
Starting from our perspective as penetration testers, we identified three main problems with existing solutions in vulnerability identification:

Accuracy and completeness of results - Many tools exhibit limited precision and recall, often depending on a single data source (e.g. NVD) and overlooking critical indicators such as known exploits or patch history.
Rigid input requirements - Most solutions enforce strict formatting constraints (e.g., requiring exact CPEs), creating usability and reliability issues when dealing with diverse or incomplete data.
Lack of usable outputs - The inability to meaningfully export or integrate results into broader workflows hampers both manual and automated security processes.

In order to solve these challenges, we developed the open-source tool search_vulns. It leverages information from multiple data sources and uses text comparison techniques and CPEs in combination to increase accuracy in software identification. Due to this approach, it can even automatically generate CPEs that have yet to be published. Together with its custom logic for version comparison, this further enhances the quality of results. Finally, search_vulns provides a fine-granular export of results in different formats.
In conclusion, this talk aims to simplify the surprising complexity of finding known vulnerabilities in software. To do so, we discuss common challenges in mapping software names to CPEs, e.g. for product rebrandings, single-version vulnerabilities and yet to be published software versions. In addition, we present an approach using multiple data  sources in combination to enrich CVE data with information on known exploits, likelihood of exploitability (EPSS) and other data sources. Finally, we present search_vulns as open-source tool.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56473-eng-The_Surprising_Complexity_of_Finding_Known_Vulnerabilities_sd.mp4"
        length="58720256"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 09:50:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56473-eng-The_Surprising_Complexity_of_Finding_Known_Vulnerabilities_sd.mp4?1764151782</guid>
      <dc:identifier>dae5a632-92c6-4d65-b9d1-b4c61b311223</dc:identifier>
      <dc:date>2025-11-26T09:50:00+01:00</dc:date>
      <itunes:author>Dustin Born, Matthias Göhring</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56473, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>With the increasing reliance on third-party software components, ensuring their security against known vulnerabilities has become a daily challenge for individuals and organizations. Despite the availability of a variety of tools and databases, we found all of them fall
                            short when applied to real-world scenarios - raising questions about their effectiveness, generalizability, and practical utility.
Starting from our perspective as penetration testers, we identified three main problems with existing solutions in vulnerability identification:

Accuracy and completeness of results - Many tools exhibit limited precision and recall, often depending on a single data source (e.g. NVD) and overlooking critical indicators such as known exploits or patch history.
Rigid input requirements - Most solutions enforce strict formatting constraints (e.g., requiring exact CPEs), creating usability and reliability issues when dealing with diverse or incomplete data.
Lack of usable outputs - The inability to meaningfully export or integrate results into broader workflows hampers both manual and automated security processes.

In order to solve these challenges, we developed the open-source tool search_vulns. It leverages information from multiple data sources and uses text comparison techniques and CPEs in combination to increase accuracy in software identification. Due to this approach, it can even automatically generate CPEs that have yet to be published. Together with its custom logic for version comparison, this further enhances the quality of results. Finally, search_vulns provides a fine-granular export of results in different formats.
In conclusion, this talk aims to simplify the surprising complexity of finding known vulnerabilities in software. To do so, we discuss common challenges in mapping software names to CPEs, e.g. for product rebrandings, single-version vulnerabilities and yet to be published software versions. In addition, we present an approach using multiple data  sources in combination to enrich CVE data with information on known exploits, likelihood of exploitability (EPSS) and other data sources. Finally, we present search_vulns as open-source tool.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:35</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56473-dae5a632-92c6-4d65-b9d1-b4c61b311223.jpg"/>
    </item>
    <item>
      <title>How we hacked Y Combinator companies&#39; AI agents (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56489-how-we-hacked-y-combinator</link>
      <description>We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we&#39;ll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_sd.mp4"
        length="65011712"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 14:55:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_sd.mp4?1764171282</guid>
      <dc:identifier>626be573-f64c-480c-a2db-1ccaeec57764</dc:identifier>
      <dc:date>2025-11-26T14:55:00+01:00</dc:date>
      <itunes:author>René Brandel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56489, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we&#39;ll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:28</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56489-626be573-f64c-480c-a2db-1ccaeec57764.jpg"/>
    </item>
    <item>
      <title>Closing (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56496-closing</link>
      <description>Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56496-eng-Closing_sd.mp4"
        length="20971520"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 17:35:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56496-eng-Closing_sd.mp4?1764190506</guid>
      <dc:identifier>7410cd2e-0fd2-47b0-b439-4f7e8da5130d</dc:identifier>
      <dc:date>2025-11-26T17:35:00+01:00</dc:date>
      <itunes:author>OWASP German Chapter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56496, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:04:06</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56496-7410cd2e-0fd2-47b0-b439-4f7e8da5130d.jpg"/>
    </item>
    <item>
      <title>All the WAF power to the devs - why it reduces friction… and where it backfires (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56478-all-the-waf-power-to-the-d</link>
      <description>Web application firewalls are often seen as a hindrance when going live, as perimeter WAFs can clash with GitOps-driven platforms. Empowering development teams with an application-centric WAF setup allows them to run and tune the WAF throughout the entire development lifecycle. It also enables full integration into any CI/CD pipeline or GitOps approach, reducing late surprises during deployment.
In this talk, we demonstrate the application-centric approach with Envoy Proxy, OWASP Coraza, and the OWASP Core Rule Set (components are examples and interchangeable; focus is on principles and selection criteria), and take you along our real-world journey - highlighting the challenges and lessons learned. What you&#39;ll take away: We show where this reusable reference design reduces friction and where it backfires, and we outline the governance and guardrails needed to make it work in practice.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56478-eng-All_the_WAF_power_to_the_devs_-_why_it_reduces_friction_and_where_it_backfires_sd.mp4"
        length="81788928"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 11:10:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56478-eng-All_the_WAF_power_to_the_devs_-_why_it_reduces_friction_and_where_it_backfires_sd.mp4?1764161756</guid>
      <dc:identifier>9a191c51-bf9c-4cb8-a6e4-cd3c7068bbb3</dc:identifier>
      <dc:date>2025-11-26T11:10:00+01:00</dc:date>
      <itunes:author>Lukas Funk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56478, 2025, god2025, Track 2, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Web application firewalls are often seen as a hindrance when going live, as perimeter WAFs can clash with GitOps-driven platforms. Empowering development teams with an application-centric WAF setup allows them to run and tune the WAF throughout the entire development lifecycle. It also enables full integration into any CI/CD pipeline or GitOps approach, reducing late surprises during deployment.
In this talk, we demonstrate the application-centric approach with Envoy Proxy, OWASP Coraza, and the OWASP Core Rule Set (components are examples and interchangeable; focus is on principles and selection criteria), and take you along our real-world journey - highlighting the challenges and lessons learned. What you&#39;ll take away: We show where this reusable reference design reduces friction and where it backfires, and we outline the governance and guardrails needed to make it work in practice.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:34:16</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56478-9a191c51-bf9c-4cb8-a6e4-cd3c7068bbb3.jpg"/>
    </item>
    <item>
      <title>&quot;I have no idea how to make it safer&quot;: Security and Privacy Mindsets of Browser Extension Developers (god2025)</title>
      <link>https://media.ccc.de/v/god2025-56488-i-have-no-idea-how-to-make</link>
      <description>Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, but also through gaps in developer awareness and ecosystem support.
In this talk, we share insights from a recent study in which we interviewed and observed 21 extension developers across the world [1] as they worked on security and privacy-related tasks that we designed based on our prior works and observations [2, 3]. Their live decision-making revealed common misconceptions, unexpected pain points, and ecosystemic obstacles in the extension development lifecycle. Extending beyond our published results, we plan to highlight some of the untold anecdotes, insecure development practices, their threat perception, the design-level challenges, as well as the misconceptions around them.
The audience will take away the following items from the presentation/discussion:
                            
Common insecure practices in extension development.
Why security ≠ privacy ≠ store compliance, as often perceived by extension developers!
Hidden design gaps and loopholes in extension architecture that developers can&#39;t spot or comprehend.
Anecdotes on the course of extension development in the era of LLMs.
Developers, regulations (GDPR/CCPA/CRA), and a few “interesting” opinions.
And, most importantly, why you should NOT give up on them just yet! :)


References:
                            
[1] Agarwal, Shubham, et al. “I have no idea how to make it safer”: Studying Security and Privacy Mindsets of Browser Extension Developers. Proceedings of the 34th USENIX Security Symposium 2025.
[2] Agarwal, Shubham, Aurore Fass, and Ben Stock. Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions. Proceedings of the 31st ACM SIGSAC Conference on Computer and Communications Security. 2024.
[3] Agarwal, Shubham. Helping or hindering? How browser extensions undermine security. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56488-eng-I_have_no_idea_how_to_make_it_safer_Security_and_Privacy_Mindsets_of_Browser_Extension_Developers_sd.mp4"
        length="44040192"
        type="video/mp4"/>
      <pubDate>Wed, 26 Nov 2025 14:55:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56488-eng-I_have_no_idea_how_to_make_it_safer_Security_and_Privacy_Mindsets_of_Browser_Extension_Developers_sd.mp4?1764170874</guid>
      <dc:identifier>9e712464-901b-4fcc-87cd-f80e84e4d6f4</dc:identifier>
      <dc:date>2025-11-26T14:55:00+01:00</dc:date>
      <itunes:author>Shubham Agrawal</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>56488, 2025, god2025, Track 1, god2025-eng, god2025, Day 1</itunes:keywords>
      <itunes:summary>Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, but also through gaps in developer awareness and ecosystem support.
In this talk, we share insights from a recent study in which we interviewed and observed 21 extension developers across the world [1] as they worked on security and privacy-related tasks that we designed based on our prior works and observations [2, 3]. Their live decision-making revealed common misconceptions, unexpected pain points, and ecosystemic obstacles in the extension development lifecycle. Extending beyond our published results, we plan to highlight some of the untold anecdotes, insecure development practices, their threat perception, the design-level challenges, as well as the misconceptions around them.
The audience will take away the following items from the presentation/discussion:
                            
Common insecure practices in extension development.
Why security ≠ privacy ≠ store compliance, as often perceived by extension developers!
Hidden design gaps and loopholes in extension architecture that developers can&#39;t spot or comprehend.
Anecdotes on the course of extension development in the era of LLMs.
Developers, regulations (GDPR/CCPA/CRA), and a few “interesting” opinions.
And, most importantly, why you should NOT give up on them just yet! :)


References:
                            
[1] Agarwal, Shubham, et al. “I have no idea how to make it safer”: Studying Security and Privacy Mindsets of Browser Extension Developers. Proceedings of the 34th USENIX Security Symposium 2025.
[2] Agarwal, Shubham, Aurore Fass, and Ben Stock. Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions. Proceedings of the 31st ACM SIGSAC Conference on Computer and Communications Security. 2024.
[3] Agarwal, Shubham. Helping or hindering? How browser extensions undermine security. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022.

Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:42</itunes:duration>
      <itunes:image href="https://static.media.ccc.de/media/events/god/2025/56488-9e712464-901b-4fcc-87cd-f80e84e4d6f4.jpg"/>
    </item>
    <generator>media.ccc.de / RSS 0.3.2</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/events/god/2025/logo.jpg"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from god2025 as mp4</itunes:summary>
  </channel>
</rss>