Coder wrote a bug so bad security guards wanted a word when he arrived at work
A programmer's demo application for automated payments mistakenly credited a test account with $100 instead of $0.01 due to multiple bugs, highlighting the need for thorough software testing before deployment.
Read original articleA programmer named Trey, working for a startup telco, created a demo application for automated payments that inadvertently led to a significant financial mishap. While testing a payments gateway, he wrote software that sent test transactions. However, due to three critical bugs, the application began crediting a test account with $100 repeatedly instead of the intended $0.01. The first bug involved an incorrect exponent in the transaction value, the second was a lack of a liveness check that caused immediate retries on failure, and the third was a flaw in the randomization of credit or debit transactions. When Trey arrived at work the next day, he was confronted by security personnel regarding the unexpected accumulation of funds in the test account. Fortunately, his department head clarified the situation, but the test account balance was reset to zero. This incident highlights the potential consequences of deploying untested software and the importance of thorough testing before implementation.
- A programmer's demo app led to a financial error due to multiple bugs.
- The application mistakenly credited a test account with $100 instead of $0.01.
- Key issues included incorrect transaction values and lack of error handling.
- The incident resulted in a confrontation with security personnel.
- The importance of rigorous testing before deployment is emphasized.
Related
Firing Myself
Noormar, a developer, accidentally cleared a production database at a Social Gaming startup, causing revenue losses and customer complaints. The incident led to guilt, a tarnished reputation, and eventual resignation.
A tale of using chaos engineering at scale to keep our systems resilient
Tines software engineer Shayon Mukherjee discussed a Redis cluster upgrade incident that revealed a bug affecting customer workflows, highlighting the need for better error handling and resilience testing in system architecture.
Chase Bank glitch releases thousands in cash over Labor Day weekend
A Chase Bank glitch allowed users to exploit check deposits, leading to social media sharing and the rise of financial "tutors," raising legal challenges and highlighting the need for better security and education.
5 Months to Run Code Locally
Nathan Spencer's internship at a financial institution involved automating a process but faced hurdles from strict security protocols. After persistent efforts and colleague support, he achieved software approval, highlighting bureaucratic challenges.
Drivers Are Getting Sent to Africa
A junior engineer's coding error directed drivers to Null Island due to a faulty API integration. Key lessons included testing edge cases, validating data, and using feature flags for safer rollouts.
This retailer is pretty old and had issued their own credit cards that didn't have any sort of checksum validation. This made making test orders easy because any sequence of numbers for that credit card type would let the "checkout" call succeed, and then the order wouldn't actually be fulfilled because the card would turn out to be invalid.
We usually used a sequential list of numbers because that was so fast to type and we used a made up Address in Tok Alaska. The state picker had Alaska first and Tok (also Eek) were the shortest city names we could find in Alaska.
One day someone took a look at one of our test account's order histories and noticed that there was a tracking link for the order. That "fake" credit card number turned out to be quite real. We shipped a dress to Alaska, which was then returned to sender because the address (1 A St) didn't exist.
We were much more careful after that but as far as I know, nobody ever complained and we never heard about it from anyone outside our team.
As a dotcom kid who founded and wrote the core systems for several payment processing companies over the decades I recall 2005 when a company using one of our partner banks was breached. This was CardSystems, the largest publicly known breach at the time, and I was tasked to perform a full code review of their systems to find any issues. The payments gateway contained a valid crc nontest card number compiled into authorization logic that had no deployment switching control and recorded no transaction information when that card number was used. Any merchant using CardSystems under this payment gateway suffered unknown losses from approved transactions that were never recorded into any system. I postulated who had done this but federal law enforcement around the breach buried this and other key discoveries I had found since the company was being dissolved and my findings were therefore deemed immaterial.
Just the style here throws me.
There was a tiny bit of logic in there if I remember correctly, relating to when and whom to show the ad to.
I implemented it, tested in dev, assigned it to QA, QA approved it and rolled it out that afternoon.
The next morning when I showed up to work one of the other team leads walked straight up to me as I entered the campus, laughing hysterically.
Turned out that in production it behaved differently. The ad appeared, correctly. Then doubled every couple of seconds,1 ad, 2 ads, 4 ads and so on, until the client browser exploded into flames.
As luck would have it there was zero consequence, only chuckles all over the place. It was something to do with order of inclusion of a mad number of js libraries which differed in production and went unnoticed. The End.
If it contained the words “you’ll never believe what happened next…” they would be completely at-home.
Like, for a lot of state free application logic, or even read-only frontend stuff, just do. A roll-back or a roll-forward is easier than heavy-weight procedure.
But if payment, customer authentication, migrations of large databases comes in... Suddenly these ops-guys with their careful rollout, validation functionality, dry-runs and ring rollouts are pretty good at keeping the day boring.
It turned out very profitable for the company though. Stonewalling customers and refusing charge backs is too easy. Not picking up the phone is a good business strategy.
Then I have a bash script that runs on the raspberry pi board that has a speaker installed, something of this sort to play the doorbell chime:
while [ true ]; do
mosquitto_sub --exit-after-first-message /my-topic
play_wav my-file.wav
done
One day, when I was out and about, I got a call from my neighbor saying the doorbell was making noise non-stop and bothering him. Turns out the mqtt server crashed, the mosquitto_sub command exits right away... We had a good laugh about it as we are both software engineers.In the end, it turned out OK. The joint burned down, and Milton ended up on a beach, sans Swingline.
"The Underhanded C Contest was a programming contest to turn out code that is malicious, but passes a rigorous inspection, and looks like an honest mistake even if discovered."
“move fast and break things” …
Related
Firing Myself
Noormar, a developer, accidentally cleared a production database at a Social Gaming startup, causing revenue losses and customer complaints. The incident led to guilt, a tarnished reputation, and eventual resignation.
A tale of using chaos engineering at scale to keep our systems resilient
Tines software engineer Shayon Mukherjee discussed a Redis cluster upgrade incident that revealed a bug affecting customer workflows, highlighting the need for better error handling and resilience testing in system architecture.
Chase Bank glitch releases thousands in cash over Labor Day weekend
A Chase Bank glitch allowed users to exploit check deposits, leading to social media sharing and the rise of financial "tutors," raising legal challenges and highlighting the need for better security and education.
5 Months to Run Code Locally
Nathan Spencer's internship at a financial institution involved automating a process but faced hurdles from strict security protocols. After persistent efforts and colleague support, he achieved software approval, highlighting bureaucratic challenges.
Drivers Are Getting Sent to Africa
A junior engineer's coding error directed drivers to Null Island due to a faulty API integration. Key lessons included testing edge cases, validating data, and using feature flags for safer rollouts.