🔎 My 30-Day Source Code Auditing Challenge

A hands-on deep dive into code, security, and the mindset of an auditor.
Over the next 30 days, I’m challenging myself to step deeper into the world of source code auditing — not just to learn how insecure code looks, but to understand why it’s insecure, how vulnerabilities slip past developers, and how attackers exploit them.
🧠Why this challenge?
As a Junior Cybersecurity Analyst exploring SOC, DFIR, and malware analysis, I realized that code is often where it all begins. Whether it’s a misconfigured smart contract, a vulnerable web app, or a careless input validation flaw, insecure code can open the doors to devastating attacks. This challenge is my way of leveling up — one day at a time.
📅 What to expect:
Daily posts or recaps of real-world code audits, CTF-style challenges, open-source codebase reviews, and intentionally vulnerable apps.
Tools I’ll use:
semgrep
,bandit
,VS Code
browser dev tools, and manual techniques.Topics covered: Input validation, authentication flaws, insecure cryptography, logic bugs, hardcoded secrets, and smart contract vulnerabilities.
Writeups on what I find, what I miss, and what I learn — every step of the way.
🚀 Who’s it for?
Whether you're:
A beginner curious about cybersecurity and secure coding
A developer wanting to write safer code
Or a fellow security analyst brushing up your static analysis game
—you’ll find actionable insights, tools, and lessons here.
💬 Let’s Learn Together
I'll be sharing each post right here on Hashnode. Feel free to follow, comment, ask questions, or even join the challenge. I’m documenting the journey not to show off what I know, but to track what I’m learning — raw, real, and in-progress.
Let’s look at the code — and make it safer, one audit at a time.
#30DaysOfCodeAuditing
Subscribe to my newsletter
Read articles from Excel directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
