{"version":"1.0","description":"\u306f\u3058\u3081\u306b \u3053\u3093\u306b\u3061\u306f\u3001GMO Flatt Security \u306e\u5c0f\u5cf6\u3067\u3059\u3002\u5f0a\u793e\u3067\u306f\u3001KENRO byGMO\uff08\u30b1\u30f3\u30ed\u30fc\uff09\u3068\u3044\u3046\u8106\u5f31\u6027\u3078\u306e\u653b\u6483\u3068\u4fee\u6b63\u3067\u5b66\u3076\u30cf\u30f3\u30ba\u30aa\u30f3\u6f14\u7fd2\u306b\u7279\u5316\u3057\u305f\u3001\u958b\u767a\u8005\u5411\u3051\u306e\u30bb\u30ad\u30e5\u30a2\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u5b66\u7fd2\u30b5\u30fc\u30d3\u30b9\u3092\u958b\u767a\u3057\u3066\u3044\u307e\u3059\u3002 flatt.tech \u672c\u65e5\u306f\u3053\u306e\u30b5\u30fc\u30d3\u30b9\u306b\u95a2\u9023\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30a2\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u7814\u4fee\u3092\u59cb\u3081\u308b\u4e0a\u3067\u3069\u306e\u3088\u3046\u306a\u9805\u76ee\u3092\u691c\u8a0e\u3059\u3079\u304d\u304b\u3001\u305d\u3057\u3066\u305d\u306e\u4e2d\u3067\u6700\u3082\u60a9\u307f\u306e\u30bf\u30cd\u3067\u3042\u308b\u5916\u90e8\u306e\u5b66\u7fd2\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u6d3b\u7528\u65b9\u6cd5\u306b\u3064\u3044\u3066\u307e\u3068\u3081\u305f\u30b9\u30e9\u30a4\u30c9\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002 \u30b9\u30e9\u30a4\u30c9\u306f\u4e0b\u8a18\u306eSpeakerdeck\u306eURL\u3088\u308a\u7121\u6599\u30fb\u767b\u9332\u4e0d\u8981\u3067\u95b2\u89a7\u30fb\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3044\u305f\u3060\u3051\u307e\u3059\u3002 https://speakerdeck\u2026","provider_url":"https://hatena.blog","width":"100%","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.flatt.tech%2Fentry%2Fsecure-coding-handbook\" title=\"\u958b\u767a\u7d44\u7e54\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30a2\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u7814\u4fee\u306e\u59cb\u3081\u65b9\u3092\u7d39\u4ecb\u3057\u305f\u30b9\u30e9\u30a4\u30c9\uff08\u516832\u30da\u30fc\u30b8\uff09\u3092\u7121\u511f\u516c\u958b\u3057\u307e\u3057\u305f - GMO Flatt Security Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/f/flattsecurity/20250219/20250219130654.png","type":"rich","author_url":"https://blog.hatena.ne.jp/flattsecurity/","categories":["KENRO","\u6280\u8853\u7cfb\u307e\u3068\u3081"],"published":"2025-02-19 18:05:55","author_name":"flattsecurity","height":"190","provider_name":"Hatena Blog","blog_title":"GMO Flatt Security Blog","title":"\u958b\u767a\u7d44\u7e54\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30a2\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u7814\u4fee\u306e\u59cb\u3081\u65b9\u3092\u7d39\u4ecb\u3057\u305f\u30b9\u30e9\u30a4\u30c9\uff08\u516832\u30da\u30fc\u30b8\uff09\u3092\u7121\u511f\u516c\u958b\u3057\u307e\u3057\u305f","url":"https://blog.flatt.tech/entry/secure-coding-handbook","blog_url":"https://blog.flatt.tech/"}