SecAppDev 2026 lecture details

Designing "least-authority" JavaScript apps

Learn the problems and solutions of combining "trusted" and "untrusted" JavaScript. We introduce secure dialects of JavaScript and practical tools that help to prevent supply-chain attacks from third-party modules.

Tuesday June 2nd, 16:00 - 17:30
Room West Wing
Abstract

How can trusted and untrusted JavaScript modules safely co-exist within the same application runtime? Integrating untrusted code is more common than you may think: your app may load third-party scripts as "plug-ins", or perhaps your app relies on third-party modules installed via a package manager. We discuss how JS modules can be better "isolated" from one another, independent of whether you’re using JS in the front-end or back-end. We introduce secure dialects of JavaScript and practical tools that are available to help prevent supply-chain attacks from third-party modules.

Key takeaway

Learn how to get "trusted" and "untrusted" JavaScript to safely co-exist in your app.

Content level

Deep-dive

Target audience

Web developers, full-stack engineers, web application software architects

Prerequisites

We assume some familiarity with the JavaScript programming language.

Join us for SecAppDev. You will not regret it!

Grab your seat now
Tom Van Cutsem
Tom Van Cutsem

Associate Professor, KU Leuven

Expertise: Web security and Web3 (d)apps

More details

Join us for SecAppDev. You will not regret it!

Grab your seat now

Related lectures

SecAppDev offers the most in-depth content you will find in a conference setting

Grab your seat now