Skip to main content

2 posts tagged with "vulnerability"

View All Tags

· 6 min read
Marko Benjak

After using a certain tool, feature, or framework in expanding projects, things will start to look more complicated. You begin to wonder if everything is up to standards. Are things implemented correctly and are we following the best practices at the moment, so we have an easier time in the future? The short answer is probably not, because it's impossible.

Every project is different, and it requires an individual approach which will have to have some shortcuts. That being the case, each tool has a certain set of advice on what not to do. If followed, projects can avoid looming pitfalls.

feature flags downfalls cover photo

Feature flags are an innovative way of feature management. By using it, you can flag the component and easily disable or enable a feature. This can be done without redeploying the application, and it can target specific clients, regions, or any other category needed.

· One min read
Gergely Sinka

ConfigCat is NOT affected

A remote code execution flaw was recently discovered in log4j. The vulnerability is fixed in log4j 2.15.0.

Log4j is a popular Java logging library. It is used by many popular Java applications. We have double-checked our systems and SDKs to be sure that they are not affected by this vulnerability.