Visit the AppSec Village to explore application security through practical, hands-on activities. Engage with top experts, discover innovative approaches, and learn about securing the software attack surface.
Village Hours
Moscone South, Level 2, Room 204
| Day 1 | Tuesday, March 24 | 9:30am - 6pm* |
|---|---|---|
| Day 2 | Wednesday, March 25 | 9:30am - 4:30pm |
| Day 3 | Thursday, March 26 | 9:30am - 2:00pm |
| * Villages are closed from 3:15-4pm for CyBEER Ops setup | ||
Moscone West Connection Hub
Day 1 Only
Tuesday, March 24
8:30am - 10:30am
Activity Schedule In Progress
Day 1 - March 24, 2026
09:30
Hack the Duck Store
At a developer meetup on secure software development, we asked a simple question: look at this login form, how could a hacker abuse it? Not one developer in the room dared to answer. The referral code field looked harmless. The backend had no validation: self-referrals, circular referrals, unlimited...
More info...AppSec Quiz Gauntlet: Spot the Vulnerability
In AppSec Quiz Gauntlet: Spot the Vulnerability, you’ll join a hands-on security quiz built around real-world software risks. Analyze suspicious dependencies, uncover typosquatted packages, decode obfuscated snippets, and identify hidden vulnerabilities in short code samples.
More info...The Call Stack Experience
Let’s play with blocks… and learn how real application attacks unfold.
You will build real application call stacks, one foam block at a time, with each block representing function calls in a normal execution flow.
Once your stack is complete, you will see first-hand how easy it is for exploits...
More info...11:30
Cards Against Security: Trust Me, It's Secure
Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...
More info...Clash of Prompts: A Real-Time Prompt Battle Royale
Step into the ring and prove your prompt-fu! In this fast-paced multiplayer game, you go head-to-head to craft the prompt that generates the most secure code - no keyboard coding allowed. Swing by for free play on Days 1 & 2 to warm up, then battle it out on Day 3 in our grand tournament for a very...
More info...NPM Imposters - The malware detection card game
NPM Imposters is a fast-paced educational card game designed to teach players about supply chain security risks in software development, particularly through malicious NPM packages.
More info...13:30
Code Invaders: Stop The Insecure Code
Recruit: help stop the Vibe Invasion. AI-generated code is flooding the frontier with insecure logic, and it’s your job to intercept it before it hits production. Vulnerable snippets (SQL injections, hardcoded secrets, broken crypto, and risky error handling) are falling toward the pipeline. Elimina...
More info...AI Risks Through the OWASP GenAI Security Project & FinBot CTF
This interactive session uses OWASP FinBot CTF to demonstrate how agentic AI systems can fail in practice and where their weaknesses emerge. Through a live walkthrough and audience participation, attendees will explore common agentic AI risk patterns and see how these issues play out in a realistic...
More info...Hack the Duck Store
At a developer meetup on secure software development, we asked a simple question: look at this login form, how could a hacker abuse it? Not one developer in the room dared to answer. The referral code field looked harmless. The backend had no validation: self-referrals, circular referrals, unlimited...
More info...16:00
The Call Stack Experience
Let’s play with blocks… and learn how real application attacks unfold.
You will build real application call stacks, one foam block at a time, with each block representing function calls in a normal execution flow.
Once your stack is complete, you will see first-hand how easy it is for exploits...
More info...Clash of Prompts: A Real-Time Prompt Battle Royale
Step into the ring and prove your prompt-fu! In this fast-paced multiplayer game, you go head-to-head to craft the prompt that generates the most secure code - no keyboard coding allowed. Swing by for free play on Days 1 & 2 to warm up, then battle it out on Day 3 in our grand tournament for a very...
More info...SBOM Find the Flaws
SBOM Find the Flaws is a short hands-on activity (with prizes!) where participants review SBOM files and identify intentional mistakes in the data, learning how to recognize common issues in software supply-chain documentation. Prizes will be Cassie Crossley's book or a solar-powered robot!
More info...Day 2 - March 25, 2026
09:30
IoT Pentest Blitz
The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. Participants engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, h...
More info...AI Pentesting Trivia Showdown
Think you know AI pentesting? Put it to the test at this fast-paced, interactive trivia session at AppSec Village. AI Pentesting Trivia Showdown challenges participants with questions spanning offensive security fundamentals, real-world attack paths, AI-assisted testing concepts, vulnerability valid...
More info...AppSec Quiz Gauntlet: Spot the Vulnerability
In AppSec Quiz Gauntlet: Spot the Vulnerability, you’ll join a hands-on security quiz built around real-world software risks. Analyze suspicious dependencies, uncover typosquatted packages, decode obfuscated snippets, and identify hidden vulnerabilities in short code samples.
More info...The Call Stack Experience
Let’s play with blocks… and learn how real application attacks unfold.
You will build real application call stacks, one foam block at a time, with each block representing function calls in a normal execution flow.
Once your stack is complete, you will see first-hand how easy it is for exploits...
More info...12:00
IoT Pentest Blitz
The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. Participants engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, h...
More info...NPM Imposters - The malware detection card game
NPM Imposters is a fast-paced educational card game designed to teach players about supply chain security risks in software development, particularly through malicious NPM packages.
More info...Cards Against Security: Trust Me, It's Secure
Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...
More info...14:30
Hack the Duck Store
At a developer meetup on secure software development, we asked a simple question: look at this login form, how could a hacker abuse it? Not one developer in the room dared to answer. The referral code field looked harmless. The backend had no validation: self-referrals, circular referrals, unlimited...
More info...Code Invaders: Stop The Insecure Code
Recruit: help stop the Vibe Invasion. AI-generated code is flooding the frontier with insecure logic, and it’s your job to intercept it before it hits production. Vulnerable snippets (SQL injections, hardcoded secrets, broken crypto, and risky error handling) are falling toward the pipeline. Elimina...
More info...Cards Against Security: Trust Me, It's Secure
Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...
More info...Day 3 - March 26, 2026
09:30
OWASP GenAI Security Project - AIBOM Generator: From Model Transparency to AI Risk Management
This session walks through a practical AIBOM lifecycle using the open-source OWASP GenAI Security Project's AIBOM Generator, from generating an AIBOM for an AI model to using it for transparency, risk visibility, and downstream risk management activities. Attendees will see how AIBOM can help captur...
More info...Cards Against Security: Trust Me, It's Secure
Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...
More info...AppSec Quiz Gauntlet: Spot the Vulnerability
In AppSec Quiz Gauntlet: Spot the Vulnerability, you’ll join a hands-on security quiz built around real-world software risks. Analyze suspicious dependencies, uncover typosquatted packages, decode obfuscated snippets, and identify hidden vulnerabilities in short code samples.
More info...12:00
IoT Pentest Blitz
The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. Participants engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, h...
More info...Clash of Prompts: A Real-Time Prompt Battle Royale
Step into the ring and prove your prompt-fu! In this fast-paced multiplayer game, you go head-to-head to craft the prompt that generates the most secure code - no keyboard coding allowed. Swing by for free play on Days 1 & 2 to warm up, then battle it out on Day 3 in our grand tournament for a very...
More info...SBOM Find the Flaws
SBOM Find the Flaws is a short hands-on activity where participants review SBOM files and identify intentional mistakes in the data, learning how to recognize common issues in software supply-chain documentation.
More info...