Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      7 MagSafe accessories that I recommend every iPhone user should have

      June 1, 2025

      I replaced my Kindle with an iPad Mini as my ebook reader – 8 reasons why I don’t regret it

      June 1, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025
      Recent

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025

      Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 22/2025

      June 1, 2025

      Rilasciata PorteuX 2.1: Novità e Approfondimenti sulla Distribuzione GNU/Linux Portatile Basata su Slackware

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»Identified the Problem

    Identified the Problem

    January 27, 2025

    Denise‘s company formed a new team. They had a lot of low-quality legacy code, and it had gotten where it was, in terms of quality, because the company had no real policy or procedures which encouraged good code. “If it works, it ships,” was basically the motto. They wanted to change that, and the first step was creating a new software team to kick of green-field projects with an eye towards software craftsmanship.

    Enter Jack. Jack was the technical lead, and Jack had a vision of good software. This started with banning ORM-generated database models. But it also didn’t involve writing raw SQL either- Jack hand-forged their tables with the Visual Table Designer feature of SQL Server Management Studio.

    “The advantage,” he happily explained to Denise, “is that we can then just generate our ORM layer right off the database. And when the database changes, we just regenerate- it’s way easier than trying to build migrations.”

    “Right, but even if we’re not using ORM migrations, we still want to write migration scripts for our changes to our database. We need to version control them and test them.”

    “We test them by making the change and running the test suite,” Jack said.

    And what a test suite it was. There was 100% test coverage. There was test coverage on simple getter/setter methods. There was test coverage on the data transfer objects, which had no methods but getters and setters. There were unit tests for functions that did nothing more than dispatch to built-in functions. Many of the tests just verified that a result was returned, but never checked what the result was. There were unit tests on the auto-generated ORM objects.

    The last one, of course, meant that any time they changed the database, there was a significant risk that the test suite would fail on code that they hadn’t written. Not only did they need to update the code consuming the data, the tests on that code, they also had to update the tests on the autogenerated code.

    Jack’s magnum opus, in the whole thing, was that he designed the software with a plugin architecture. Instead of tightly coupling different implementations of various modules together, there was a plugin loader which could fetch an assembly at runtime and use that. Unfortunately, while the whole thing could have plugins, all of the abstractions leaked across module boundaries so you couldn’t reasonably swap out plugins without rewriting the entire application. Instead of making a modular architecture, Jack just made starting the application wildly inefficient.

    Denise and her team brought their concerns to management. Conversations were had, and it fell upon Jack to school them all. Cheerfully, he said: “Look, not everyone gets software craftsmanship, so I’m going to implement a new feature as sort of a reference implementation. If you follow the pattern I lay out, you’ll have an easy time building good code!”

    Hostinger

    The new feature was an identity verification system which called for end users to upload photographs of their IDs- drivers’ licenses, passports, etc. It was not a feature which should have had one developer driving the whole thing, and Jack was not implementing the entire lifecycle of data management for this; instead he was just implementing the upload feature.

    Jack pushed it through, out and up into production. Somehow, he short-cut past any code reviews, feature reviews, or getting anyone else to test it. He went straight to a demo in production, where he uploaded his passport and license. “So, there you go, a reference implementation for you all.”

    Denise went ahead and ran her own test, with a synthetic ID for a test user, which didn’t contain any real humans’ information. The file upload crashed. In fact, in an ultimate variation of “it works on my machine,” the only person who ever successfully used the upload feature was Jack. Of course, since the upload never worked, none of the other features, like retention policies, ever got implemented either.

    Now, this didn’t mean the company couldn’t do identity verification- they had an existing system, so they just kept redirecting users to that, instead of the new version, which didn’t work.

    Jack went on to other features, though, because he was a clever craftsman and needed to bring his wisdom to the rest of their project. So the file upload just languished, never getting fixed. Somehow, this wasn’t Jack’s fault, management didn’t hold him responsible, and everyone was still expected to follow the patterns he used in designing the feature to guide their own work.

    Until, one day, the system was breached by hackers. This, surprisingly, had nothing to do with Jack’s choices- one of the admins got phished. This meant that the company needed to send out an announcement, informing users that they were breached. “We deeply regret the breach in our identity verification system, but can confirm that no personal data for any of our customers was affected.”

    Jack, of course, was not a customer, so he got a private disclosure that his passport and ID had been compromised.

    [Advertisement]
    Keep the plebs out of prod. Restrict NuGet feed privileges with ProGet. Learn more.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCodePen? AI Editors are like Pens for Code
    Next Article matrix-commander – simple CLI-based Matrix client

    Related Posts

    News & Updates

    7 MagSafe accessories that I recommend every iPhone user should have

    June 1, 2025
    News & Updates

    I replaced my Kindle with an iPad Mini as my ebook reader – 8 reasons why I don’t regret it

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Google’s New Restore Credentials Tool Simplifies App Login After Android Migration

    Development

    7 Best Free and Open Source UPnP Media Servers

    Development

    5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy

    Development

    The Next Big Trends in Large Language Model (LLM) Research

    Development

    Highlights

    CVE-2025-47895 – Apache HTTP Server Authentication Bypass

    May 14, 2025

    CVE ID : CVE-2025-47895

    Published : May 14, 2025, 4:16 a.m. | 2 hours, 39 minutes ago

    Description : Rejected reason: Not used

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Hey Sony, take notes! Virtuos’ The Elder Scrolls IV: Oblivion just proved there’s more to a great remaster than meets the eye

    April 23, 2025

    How to Build a Food Delivery App Like Zomato: Cost, Features, and Process

    December 18, 2024

    Doom, Quake, and Turok remaster studio ask what fan-favorite game they should work on next

    January 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.