Secure Code is Critical Infrastructure
This talk addresses the systemic lack of secure coding policies and vulnerability disclosure programs within government infrastructure. It highlights the risks posed by insecure software in public-facing services and the absence of standardized security education for developers. The speaker advocates for the adoption of a practical, language-agnostic secure coding policy and provides templates for developers and citizens to lobby for improved software security practices.
Why Your Government’s Lack of Secure Coding Policy Is a National Security Risk
TLDR: Government software often lacks basic secure coding standards, creating massive, unmanaged attack surfaces that threaten public data and critical infrastructure. This talk exposes the systemic failure to implement even fundamental security controls like HTTPS or robust authentication in public-facing services. Researchers and bug bounty hunters should focus on these gaps, as they represent low-hanging fruit that often goes unaddressed due to bureaucratic inertia.
Software security is not just a checkbox for compliance teams or a hurdle for developers to clear before a release. It is the foundation of modern critical infrastructure. When government agencies deploy public-facing applications without a coherent, enforceable secure coding policy, they are not just failing to follow best practices. They are actively inviting exploitation of the systems that hold the most sensitive data of their citizens.
The reality is that many government departments operate under a "vibe-based" security model. Developers graduate from universities without ever having taken a single course on secure coding, and they enter the workforce to build systems that handle tax records, health data, and personal identification. Without a standardized policy to guide them, every team does its own thing. This leads to a fragmented, inconsistent, and ultimately insecure environment where vulnerabilities like those described in the OWASP Top 10: Security Misconfiguration are not just common, they are the default.
The Cost of Policy Failure
When an agency lacks a formal secure coding policy, the consequences are predictable. We see a lack of automated vulnerability management, no public-facing bug bounty programs, and a total absence of safe harbor for researchers who find critical flaws. This creates a chilling effect where the only people finding these bugs are the ones who intend to weaponize them.
Consider the impact of a simple misconfiguration. If a public-facing government portal does not enforce HTTPS or allows cleartext communication, it is trivial for an attacker to intercept sensitive traffic. If the underlying infrastructure does not have a Software Bill of Materials (SBOM) or a process for Software Composition Analysis (SCA), the agency has no way to track or patch vulnerable third-party dependencies. This is how massive, preventable breaches occur. When these agencies are forced to admit to "material" breaches, it is often only after the damage is already done and the data is long gone.
Bridging the Gap with Actionable Standards
Defending these systems requires moving away from high-level, vague guidance and toward concrete, actionable requirements. A policy that says "protect sensitive data" is useless. A policy that mandates specific cryptographic standards, requires input validation for all API endpoints, and enforces secure credential storage is a tool that developers can actually use.
For those of us in the offensive security space, this is an opportunity to push for change. We can use tools like Semgrep to automate the detection of common insecure patterns in codebases. By integrating these tools into the CI/CD pipeline, we can catch vulnerabilities before they ever reach production. However, tools are only as effective as the policies that mandate their use. If the policy is non-existent or ignored, the best tooling in the world will not stop a determined attacker.
How to Force the Issue
If you are a researcher or a pentester, you have a unique vantage point. You see the gaps that the agencies themselves are either ignoring or are too under-resourced to address. When you encounter these issues, do not just file a report and move on. Use your findings to advocate for the implementation of a Vulnerability Disclosure Program (VDP).
The goal is to move from a culture of silence to one of transparency. If an agency is stonewalling, use the public nature of your research to apply pressure. Contact your local representatives, share your findings with the broader security community, and demand that these organizations adopt a standardized, language-agnostic secure coding policy. The Secure Coding Guideline is a great starting point for anyone looking to provide a template for their local government.
We have to stop accepting the excuse that "it is too expensive" or "too hard" to secure government software. The cost of a breach, in terms of both financial loss and the erosion of public trust, is orders of magnitude higher than the cost of implementing a robust security program. Every time we hold an agency accountable for their lack of policy, we make the digital landscape slightly safer for everyone.
Stop waiting for the government to wake up on its own. Start the conversation, provide the resources, and keep the pressure on until secure coding becomes the standard, not the exception. If you are looking for a place to start, look at the official documentation provided by national cybersecurity centers and compare it against the reality of the systems you are testing. The gap between the two is where your next research project should be.
Vulnerability Classes
Tools Used
Target Technologies
OWASP Categories
Up Next From This Conference

The State of Open Source in the Federal Government

Dark Capabilities: When Tech Companies Become Threat Actors

Third-Party Access Granted: A Postmortem on Student Privacy and the Exploit That's Still in Production
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

