The bearer of this certificate earned 300 total points
by completing secure coding labs through Veracode Security Labs.
Labs are a form of secure code training that
involves hands-on-keyboard
exercises, where users demonstrate their abilities to exploit and patch
code using real applications.

Rajeev Dyal
657a3c4069
13 Mar 2026
The following labs were completed toward certification:
| Lab Name | Topic Name | Language | Points |
|---|---|---|---|
| Do You Remember? | Beyond OWASP Top 10: Other Web App Risks | 10 | |
| To Protect and to Serve Secure Cookies | OWASP 1: Broken Access Control | 20 | |
| Loose Lips Sink Servers | OWASP 1: Broken Access Control | 10 | |
| Forging User Requests | OWASP 1: Broken Access Control | 10 | |
| Redirect Rodeo | OWASP 1: Broken Access Control | 10 | |
| Get There from Here | OWASP 1: Broken Access Control | 10 | |
| Jot down this key | OWASP 2: Security Misconfiguration | 10 | |
| Insufficient Entropy | OWASP 4: Cryptographic Failures | 10 | |
| eXternal Entity (injection) | OWASP 2: Security Misconfiguration | 10 | |
| Suspicious Packages | OWASP 3: Software Supply Chain Failures | 10 | |
| Own the database | OWASP 5: Injection | 10 | |
| Parameterize all the things | OWASP 5: Injection | 10 | |
| Bugs in Debug | OWASP 4: Cryptographic Failures | 10 | |
| Can you see your reflection? | OWASP 5: Injection | 10 | |
| Down with Uploads | OWASP 5: Injection | 20 | |
| Stored XSS versus CSP | OWASP 5: Injection | 20 | |
| Valid Deficit | OWASP 6: Insecure Design | 10 | |
| Really, really bad passwords | OWASP 7: Authentication Failures | 10 | |
| Hash it, store it, salt - upgrade it | OWASP 7: Authentication Failures | 10 | |
| Bad Cookie Challenge | OWASP 1: Broken Access Control | 10 | |
| XML is always a challenge Challenge | OWASP 2: Security Misconfiguration | 10 | |
| Outdated Dependencies Challenge | OWASP 3: Software Supply Chain Failures | 10 | |
| Helpful Stack Trace Challenge | OWASP 4: Cryptographic Failures | 10 | |
| Bobby Tables Challenge | OWASP 5: Injection | 10 | |
| Making Secure Decisions | OWASP 6: Insecure Design | 10 | |
| Authentication Bypass | OWASP 7: Authentication Failures | 10 | |
| Secret Admin Challenge | OWASP 2: Security Misconfiguration | 10 |