Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "cosmetics"
-
So, some time ago, I was working for a complete puckered anus of a cosmetics company on their ecommerce product. Won't name names, but they're shitty and known for MLM. If you're clever, go you ;)
Anyways, over the course of years they brought in a competent firm to implement their service layer. I'd even worked with them in the past and it was designed to handle a frankly ridiculous-scale load. After they got the 1.0 released, the manager was replaced with some absolutely talentless, chauvinist cuntrag from a phone company that is well known for having 99% indian devs and not being able to heard now. He of course brought in his number two, worked on making life miserable and running everyone on the team off; inside of a year the entire team was ex-said-phone-company.
Watching the decay of this product was a sheer joy. They cratered the database numerous times during peak-load periods, caused $20M in redis-cluster cost overrun, ended up submitting hundreds of erroneous and duplicate orders, and mailed almost $40K worth of product to a random guy in outer mongolia who is , we can only hope, now enjoying his new life as an instagram influencer. They even terminally broke the automatic metadata, and hired THIRTY PEOPLE to sit there and do nothing but edit swagger. And it was still both wrong and unusable.
Over the course of two years, I ended up rewriting large portions of their infra surrounding the centralized service cancer to do things like, "implement security," as well as cut memory usage and runtimes down by quite literally 100x in the worst cases.
It was during this time I discovered a rather critical flaw. This is the story of what, how and how can you fucking even be that stupid. The issue relates to users and their reports and their ability to order.
I first found this issue looking at some erroneous data for a low value order and went, "There's no fucking way, they're fucking stupid, but this is borderline criminal." It was easy to miss, but someone in a top down reporting chain had submitted an order for someone else in a different org. Shouldn't be possible, but here was that order staring me in the face.
So I set to work seeing if we'd pwned ourselves as an org. I spend a few hours poring over logs from the log service and dynatrace trying to recreate what happened. I first tested to see if I could get a user, not something that was usually done because auth identity was pervasive. I discover the users are INCREMENTAL int values they used for ids in the database when requesting from the API, so naturally I have a full list of users and their title and relative position, as well as reports and descendants in about 10 minutes.
I try the happy path of setting values for random, known payment methods and org structures similar to the impossible order, and submitting as a normal user, no dice. Several more tries and I'm confident this isn't the vector.
Exhausting that option, I look at the protocol for a type of order in the system that allowed higher level people to impersonate people below them and use their own payment info for descendant report orders. I see that all of the data for this transaction is stored in a cookie. Few tests later, I discover the UI has no forgery checks, hashing, etc, and just fucking trusts whatever is present in that cookie.
An hour of tweaking later, I'm impersonating a director as a bottom rung employee. Score. So I fill a cart with a bunch of test items and proceed to checkout. There, in all its glory are the director's payment options. I select one and am presented with:
"please reenter card number to validate."
Bupkiss. Dead end.
OR SO YOU WOULD THINK.
One unimportant detail I noticed during my log investigations that the shit slinging GUI monkeys who butchered the system didn't was, on a failed attempt to submit payment in the DB, the logs were filled with messages like:
"Failed to submit order for [userid] with credit card id [id], number [FULL CREDIT CARD NUMBER]"
One submit click later and the user's credit card number drops into lnav like a gatcha prize. I dutifully rerun the checkout and got an email send notification in the logs for successful transfer to fulfillment. Order placed. Some continued experimentation later and the truth is evident:
With an authenticated user or any privilege, you could place any order, as anyone, using anyon's payment methods and have it sent anywhere.
So naturally, I pack the crucifixion-worthy body of evidence up and walk it into the IT director's office. I show him the defect, and he turns sheet fucking white. He knows there's no recovering from it, and there's no way his shitstick service team can handle fixing it. Somewhere in his tiny little grinchly manager's heart he knew they'd caused it, and he was to blame for being a shit captain to the SS Failboat. He replies quietly, "You will never speak of this to anyone, fix this discretely." Straight up hitler's bunker meme rage.13 -
Developed web shop for weed dealer
once. Paid me in weed. His plan was to sell cosmetics through the site and move away from drug dealing altogether. Not sure if he actually did it, as I was too high to finish it..7 -
My first dev job is my current job, but I'm leaving it tomorrow to go on on an internship overseas, then return my focus to completing my Computer Science bachelor's degree and getting into a Master's program.
Before this job, I was an office assistant at a small company that sold cosmetics products and fragrances. I had just returned to college after a 1.5 year hiatus and was tired of that job. I wanted to get into the field, even though my experience was limited to freelance web design and a few personal programming projects of which I no longer had any proof, and I still didn't have a degree, but I wasn't confident that someone would contact me. Yet I decided to update my resume and upload it to Indeed.com. I was already getting interviewed at a call center when this local tech startup called, and 2 weeks later, I had the job. We were 3 employees and I was, not only the first woman in the team, but also the first person to ever get hired by the directors without a college degree. Today, I still hold those two titles and the team is 3 times bigger.
It was a very bumpy ride, and tomorrow I move on to other adventures, but I'll always be grateful for the opportunity, all the lessons, and the best team mates I could ever have. Without their wisdom and guidance, I wouldn't have half the blessings I have today. I will miss them dearly, but I know we'll stay friends.
Here's to better things and to a college degree! <32 -
Ideal dev job would be to work on pretty/girly fashion or cosmetics websites, have drama free and knowledgeable co-workers, decent salary, great organization, external training opportunities, cute modern office, dogs, cats and a cafe on site, a dope recharge room & no talking to clients ever.4
-
She's so beautiful dude. If I could, I'd frikkin marry her in no time. Oh my God and she has all the right parts and cosmetics! I love you Arch Linux <3
-
Unveiling Beauty: The Power of Cosmetic Boxes
Introduction:
Cosmetic boxes are packing devices created especially to hold and show off cosmetics. They serve various objectives, such as advertising, visual identity, and protection.
Companies have a broad range of alternatives for meeting their individual demands due to the variety of aesthetic boxes accessible with respect to of forms, substances, or printing possibilities.
Functions of Cosmetic Boxes:
1. Protection: Avoiding harm to the encompassed goods while handling, storage, and transportation represents one the primary uses of cosmetic boxes. They serve as a barrier against pollutants including dust, rain, and sunshine.
2. Branding: They are essential for brand uniqueness and identification. In order to give them a unique identity, they are often customized with the logo of the business, colors, and designs. These qualities aid customers in quickly recognizing and linking items to a certain brand.
3. Marketing: Cosmetic boxes wholesale function as a marketing strategy by drawing in prospective clients and disseminating details concerning the products. Customers are drawn in and persuaded to buy product by the appealing designs, appealing photos of the products, and pertinent info displayed on the boxes.
Types of Cosmetic Boxes:
1. Folding Cartons: The most typical kind of beauty boxes are those made of folding cartons. They are composed of flimsy paperboard and are simple to shape-fold. These containers are adaptable and available in an assortment of kinds, including gable, sleeve, and tuck-end containers.
2. Rigid Boxes: Rigid boxes, often referred to as setup packages, are strong and long-lasting. They provide excellent defense for expensive cosmetics since they are composed of sturdy cardboard or cardboard. Luxury cosmetic manufacturers often utilize rigid bottles because they provide a high-end appearance and feel.
3. Display boxes: Display containers are made to promote cosmetics in an appealing way. Customers could generally view the merchandise inside thanks to transparent windows or doors. Retail stores often use display boxes to increase product exposure.
Materials Used in Manufacturing Process:
1. Paperboard:The most common material used for making cosmetic boxes is paperboard. It is lightweight, reasonably priced, and provides a range of printing and finishing possibilities. Depending on how much strength is needed and durability, many types of cardboard are accessible, which vary in low to high density.
2. Cardboard: Unlike paperboard, cardboard is a thicker, more robust material. It offers more effective defense for pricey or delicate cosmetics. To increase the durability and water resistance, cardboard containers may be customized with various coatings.
3. Plastic: Cosmetic cartons may be made of plastic, particularly clear display boxes with PVC or PET panes. Plastic boxes offer good product visibility and moisture protection. In contrast to solutions utilizing paper, they are less detrimental to the environment.
Printing Options:
1. Offset Printing: The printing method most often employed for cosmetic boxes is offset printing. Prints made with it are crisp, vibrant, and detailed. For intricate patterns, gradients, and vast numbers of boxes, the offset method is appropriate.
2. Digital Printing: Digital printing provides more flexibility and quicker turnaround times than the use of offset printing. It enables for cosmetic packaging customization that is simultaneously affordable and appropriate for small to large print runs. The color dedication, however, could be a little less accurate than with offset printing.
3. Foil Stamping: Foil stamping is the procedure of putting coloured or metallic foil on the outside or packaging for cosmetics. It enhances the overall look of the container by adding a opulent and captivating impression.
“Lipstick Boxes: Exploring Types and Varieties”
Special packaging materials known as pink boxes are made to carry and showcase lipsticks. They are available in a variety of forms to meet varied packing requirements.
The types of lipstick boxes include:
1. Folding Carton Lipstick Boxes: Made with paperboard, these boxes are portable and lightweight. They're simple to fold into form and may be personalized with various patterns and finishes.
2. Rigid Lipstick Boxes: Made of durable materials like cardboard, these boxes provide great protection of costly lipsticks. For high-end lipstick products, rigid boxes are ideal since they've an increase appearance and feel.
3. Slide Sleeve Lipstick Boxes: These vessels include a sliding sleeve function which gives a touch of class & efficiency. Branded and design elements could be added to the sleeve.
Resource: https://packagingforestllc.com/prod...