Visit the AppSec Village Sandbox to explore application security through practical, hands-on activities. Engage with top experts, discover innovative approaches, and learn about securing the software attack surface.

YBCA, Gallery 2

Open to Expo Plus Pass and Full Conference Pass holders.

Village Hours

Day 1 Monday, Apr 28 9:30 AM - 3:00 PM PT
Day 2 Tuesday, Apr 29 9:30 AM - 4:30 PM PT
Day 3 Wednesday, Apr 30 9:30 AM - 4:30 PM PT
Day 4 Thursday, May 1 9:30 AM - 2:00 PM PT

Day 1 - April 28, 2025

09:30

09:30 - 11:30

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. You can engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, hardwa...

More info...
09:30 - 11:30

Vulnerability Hunt: The AppSec Card Challenge

Checkmarx

Ready to put your Code Security knowledge to the test? Dive into our activity and tackle real-world code snippets riddled with vulnerabilities. Pick your challenge level, spot the flaws, and suggest the fix. Don't miss this hands-on opportunity to level up your AppSec game - it's all in the cards!

More info...

11:30

11:30 - 13:30

Vibe Coding Gone Wrong: Can You Catch the AI’s Mistakes?

Dryrun

Welcome to the wild world of vibe coding—where we let AI agents generate the code and hit merge without a second thought. What could possibly go wrong?

In this high-energy activity, we’ll generate pull requests using an LLM and challenge you to review it for hidden vulnerabilities before it ships...

More info...
11:30 - 13:30

NPM Imposters

Aikido

NPM Imposters is a fast, team-based game where players must spot malicious NPM packages hiding in plain sight.

Each team gets a deck of cards mimicking real npmjs.com pages — some show metadata like stars, downloads, and maintainers; others reveal parts of the package code, like index.js or packag...

More info...

13:30

13:30 - 15:30

Lock it Down: Limiting Git Access to Company-Owned Devices

Smallstep

Lock It Down, using a little-known feature from OpenSSH—hardware attestation—Smallstep created a prototype that prevents developers from pushing code from personal devices. The system ensures only approved devices can access Git repositories. SSH keys are generated with attestation data, verified vi...

More info...
13:30 - 15:30

Byte Club Cybersecurity Awareness

AppKnox

Step into the world of Byte Club, a fast-paced, strategic card game that makes cybersecurity concepts fun and approachable.

Byte Club lets players simulate real-world cyber threats and defenses using frameworks like the Cyber Kill Chain and NIST Cybersecurity Framework. Whether you're a seasoned...

More info...

Day 2 - April 29, 2025

09:30

09:30 - 11:30

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. You can engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, hardwa...

More info...
09:30 - 11:30

Critical Draw - How to Build a Culture of Security the Right Way

Symbiotic

A strong security culture can’t be bought, it has to be built. The key lies in making security a natural, painless part of developers’ workflows - and knowing “how” is the difference between success and failure.

In this exercise, you’ll step into the shoes of a developer, tasked with prioritizing...

More info...

11:30

11:30 - 13:30

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. You can engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, hardwa...

More info...
11:30 - 13:30

Lock it Down: Limiting Git Access to Company-Owned Devices

Smallstep

Lock It Down, using a little-known feature from OpenSSH—hardware attestation—Smallstep created a prototype that prevents developers from pushing code from personal devices. The system ensures only approved devices can access Git repositories. SSH keys are generated with attestation data, verified vi...

More info...

13:30

13:30 - 15:30

Critical Draw - How to Build a Culture of Security the Right Way

Symbiotic

A strong security culture can’t be bought, it has to be built. The key lies in making security a natural, painless part of developers’ workflows - and knowing “how” is the difference between success and failure.

In this exercise, you’ll step into the shoes of a developer, tasked with prioritizing...

More info...
13:30 - 15:30

Vibe Coding Gone Wrong: Can You Catch the AI’s Mistakes?

Dryrun

Welcome to the wild world of vibe coding—where we let AI agents generate the code and hit merge without a second thought. What could possibly go wrong?

In this high-energy activity, we’ll generate pull requests using an LLM and challenge you to review it for hidden vulnerabilities before it ships...

More info...

15:30

15:30 - 16:30

Fort Knox: The Ultimate Security Showdown

AppKnox

Step into the castle walls of Fort Knox, a medieval-themed puzzle battle where “Testers” and “Hackers” face off to defend—or dismantle—the fort!

In this fun, hands-on group activity, each team races to complete their side of a jigsaw puzzle. It’s a test of teamwork, strategy, and speed! Will you...

More info...
15:30 - 16:30

Hacking Developers’ Trust – Faking GitHub Contribution

Checkmarx

Join us for a revealing exploration of open-source trust and its vulnerabilities. In this captivating activity, we will delve into the fascinating world of developer credibility and the unsettling phenomenon of faking GitHub contributions. With open source becoming an integral part of software devel...

More info...

Day 3 - April 30, 2025

09:30

09:30 - 11:30

Lock it Down: Limiting Git Access to Company-Owned Devices

Smallstep

Lock It Down, using a little-known feature from OpenSSH—hardware attestation—Smallstep created a prototype that prevents developers from pushing code from personal devices. The system ensures only approved devices can access Git repositories. SSH keys are generated with attestation data, verified vi...

More info...
09:30 - 11:30

Critical Draw - How to Build a Culture of Security the Right Way

Symbiotic

A strong security culture can’t be bought, it has to be built. The key lies in making security a natural, painless part of developers’ workflows - and knowing “how” is the difference between success and failure.

In this exercise, you’ll step into the shoes of a developer, tasked with prioritizing...

More info...

11:30

11:30 - 13:30

Vibe Coding Gone Wrong: Can You Catch the AI’s Mistakes?

Dryrun

Welcome to the wild world of vibe coding—where we let AI agents generate the code and hit merge without a second thought. What could possibly go wrong?

In this high-energy activity, we’ll generate pull requests using an LLM and challenge you to review it for hidden vulnerabilities before it ships...

More info...
11:30 - 13:30

NPM Imposters

Aikido

NPM Imposters is a fast, team-based game where players must spot malicious NPM packages hiding in plain sight.

Each team gets a deck of cards mimicking real npmjs.com pages — some show metadata like stars, downloads, and maintainers; others reveal parts of the package code, like index.js or packag...

More info...

13:30

13:30 - 15:30

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. You can engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, hardwa...

More info...
13:30 - 15:30

Critical Draw - How to Build a Culture of Security the Right Way

Symbiotic

A strong security culture can’t be bought, it has to be built. The key lies in making security a natural, painless part of developers’ workflows - and knowing “how” is the difference between success and failure.

In this exercise, you’ll step into the shoes of a developer, tasked with prioritizing...

More info...

15:30

15:30 - 16:30

NPM Imposters

Aikido

NPM Imposters is a fast, team-based game where players must spot malicious NPM packages hiding in plain sight.

Each team gets a deck of cards mimicking real npmjs.com pages — some show metadata like stars, downloads, and maintainers; others reveal parts of the package code, like index.js or packag...

More info...
15:30 - 16:40

Vulnerability Hunt: The AppSec Card Challenge

Checkmarx

Ready to put your Code Security knowledge to the test? Dive into our activity and tackle real-world code snippets riddled with vulnerabilities. Pick your challenge level, spot the flaws, and suggest the fix. Don't miss this hands-on opportunity to level up your AppSec game - it's all in the cards!

More info...

Day 4 - May 01, 2025

09:30

09:30 - 12:00

Lock it Down: Limiting Git Access to Company-Owned Devices

Smallstep

Lock It Down, using a little-known feature from OpenSSH—hardware attestation—Smallstep created a prototype that prevents developers from pushing code from personal devices. The system ensures only approved devices can access Git repositories. SSH keys are generated with attestation data, verified vi...

More info...
09:30 - 12:00

Hacking Developers’ Trust – Faking GitHub Contribution

Checkmarx

Ready to put your Code Security knowledge to the test? Dive into our activity and tackle real-world code snippets riddled with vulnerabilities. Pick your challenge level, spot the flaws, and suggest the fix. Don't miss this hands-on opportunity to level up your AppSec game - it's all in the cards!

More info...

Thanks to our 2025 Sponsors

Gold Sponsors


Silver Sponsors


Bronze Sponsors


Is your organization passionate about application security and want to sponsor?

Read on how to become a sponsor and checkout our available sponsorship opportunities.