Summary
In this chapter, we explored the various forms security can take, and we learned that it is not limited to the security of the application’s code but rather covers a broad spectrum of areas that span its entire lifecycle. We learned what tools and techniques we can use to assess and enhance the security posture of our CLI application. We also learned how to secure access to user data, especially when dealing with external services, by implementing authentication and authorization.
Congratulations! You have now all the necessary knowledge and skills to build, secure, test, package, and release your very own CLI applications to the world. Look at you – what a milestone you have achieved. Take a moment to be proud of yourself and to celebrate!
My journey with you, throughout the pages of this book, is almost over. But before you turn the last page and gently close the cover of this book, there is one last thing I wanted to share with you, one final chapter...