Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Top 11 Security Mistakes in Next.js 15 to Avoid - Don't Leak User Data!

ByteGrad via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about the most critical security vulnerabilities in Next.js 15 applications through this comprehensive 32-minute tutorial that covers eleven common mistakes developers make that can lead to user data leaks and security breaches. Explore insufficient server action protection, inadequate route handler security, and server component vulnerabilities while understanding how to properly implement authorization and prevent SQL injection attacks. Discover how to protect against XSS and CSRF attacks, implement effective rate limiting and bot protection, and avoid data leakage in both client components and data fetching operations. Master security best practices including email validation, OWASP security principles, and learn how to use security tools like Arcjet for comprehensive application protection, ensuring your Next.js applications remain secure and user data stays protected.

Syllabus

00:00 Security in Next.js
01:30 Arcjet
02:16 11 - Insufficient server action protection
06:42 Email validation Arcjet
09:01 10 - Insufficient route handler protection
10:13 9 - Insufficient server component RSC protection
12:28 8 - SQL injection
13:39 7 - XSS attack
15:25 6 - CSRF attack
16:58 OWASP & Arcjet Shield
18:13 5 - Forgetting authorization
20:39 4 - Insufficient rate limiting
22:13 3 - Insufficient bot protection
23:45 2 - Leaking data in client components
27:28 1 - Leaking data with data fetching

Taught by

ByteGrad

Reviews

Start your review of Top 11 Security Mistakes in Next.js 15 to Avoid - Don't Leak User Data!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.