Skip to the content.
EEF Logo EEF Security WG
  • Foundation Website

Articles

Latest articles curated from various publishers.

Erlang Ecosystem Foundation Becomes CVE Numbering Authority (CNA) for the Hex and BEAM Ecosystem

by Erlang Ecosystem Foundation · 13 May 2025

The Erlang Ecosystem Foundation CNA has officially joined the CVE® Program as an authorized CVE Numbering Authority (CNA). This designation allows us to assign CVE IDs and publish CVE Records for publicly disclosed cybersecurity vulnerabilities within our defined scope, helping to improve security and transparency in the broader open-source community.

Read more

Elixir and Phoenix Security Checklist: 11 Best Practices

by Paraxial.io · 11 February 2025

Coding web apps with Elixir + Phoenix offers a strong foundation, but real security demands vigilance. Drawing on hands-on pentesting experience, this article outlines 11 essential best practices — from maintaining a public-app inventory and running static analysis (Sobelow) to locking down SSH/ports, limiting exposure of your database and user uploads, averting SSRF, and avoiding mass assignment vulnerabilities — to help developers prevent data breaches.

Read more

Exposed EPMD: A Hidden Security Risk for RabbitMQ and the BEAM Ecosystem

by Erlang Ecosystem Foundation · 17 December 2024

EPMD, essential for Erlang and RabbitMQ clustering, is often exposed online—posing hidden security risks and requiring quick mitigation steps.

Read more

Elixir/Phoenix Security: Remote Code Execution and Serialisation

by Paraxial.io · 28 February 2023

This post shows how unsafe use of :erlang.binary_to_term/2 (even with :safe) can enable remote code execution in Elixir/Phoenix apps, demonstrates a real Paginator exploit that deserializes attacker-supplied functions, and gives practical fixes — use non_executable_binary_to_term/2, run Sobelow scans, and follow secure serialization guidance to prevent RCE.

Read more

Detecting SQL Injection in Phoenix with Sobelow

by Paraxial.io · 6 October 2022

This post demonstrates how SQL injection can still occur in Phoenix apps despite Ecto’s protections, showing safe vs. unsafe patterns, a working exploit built from unsafe string interpolation, and practical detection and mitigation using Sobelow and parameterized queries to keep Phoenix apps secure.

Read more

Supporting the BEAM community

About the EEF
  • Membership details
  • Join us!
  • Sponsors
  • Working Groups
  • Stipends
  • Bylaws
  • FAQ
Stay Up-to-Date
  • News
  • Events
Get in Touch
  • Contact Us