<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: George Psistakis</title>
    <description>The latest articles on DEV Community by George Psistakis (@gpstrnt).</description>
    <link>https://dev.to/gpstrnt</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3858263%2F201463ad-a948-4109-89db-641d4268975f.jpg</url>
      <title>DEV Community: George Psistakis</title>
      <link>https://dev.to/gpstrnt</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gpstrnt"/>
    <language>en</language>
    <item>
      <title>How to Get Ongoing Security Advice While Building on Lovable</title>
      <dc:creator>George Psistakis</dc:creator>
      <pubDate>Wed, 29 Apr 2026 19:49:37 +0000</pubDate>
      <link>https://dev.to/trent-ai/how-to-get-ongoing-security-advice-while-building-on-lovable-4lih</link>
      <guid>https://dev.to/trent-ai/how-to-get-ongoing-security-advice-while-building-on-lovable-4lih</guid>
      <description>&lt;p&gt;Building on Lovable is fast. You go from idea to working product in hours. And Lovable's built-in security covers the fundamentals: safe defaults, low-level vulnerability scans, solid infrastructure.&lt;/p&gt;

&lt;p&gt;But as you move from prototype to real product, security questions start coming up that those defaults don't answer. Is this endpoint properly protected? Am I handling user data correctly? Did this new feature introduce something? Is my application actually secure? Not just "no obvious vulnerabilities," but &lt;em&gt;secure&lt;/em&gt;?&lt;/p&gt;

&lt;p&gt;These questions don't come up once. They come up continuously as your app evolves. And the existing options aren't great: hire a pentester (expensive, point-in-time, tells you about problems after you've already shipped them) or become a security expert yourself (you're building a product, not studying for a certification).&lt;/p&gt;

&lt;h2&gt;
  
  
  What we built
&lt;/h2&gt;

&lt;p&gt;Trent's Security Advisor for Lovable is a security agent that continuously reviews your application as you build it. Not a one-time scan. Ongoing analysis that keeps up with your changes.&lt;/p&gt;

&lt;p&gt;Under the hood, multiple agents work together: scanning your code, filtering what actually matters from the noise, building a prioritized plan to fix what they find. When you approve a fix, Trent connects directly to Lovable via MCP and implements it. No manual triaging, no copy-pasting patches.&lt;/p&gt;

&lt;p&gt;You can also ask security questions whenever they come up. "Is this API endpoint safe?" "Am I storing user data correctly?" "What should I tell my investor about security?" You get specific answers grounded in your actual codebase, not generic advice.&lt;/p&gt;

&lt;h2&gt;
  
  
  How it works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Connect your GitHub repo&lt;/strong&gt; to Trent and install the Trent MCP server in Lovable's settings.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Start your first security assessment.&lt;/strong&gt; Trent scans your project and builds a prioritized plan.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review the plan and approve fixes.&lt;/strong&gt; Trent implements them directly in Lovable via MCP.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That's the whole setup. You build with Lovable. You secure with Trent.&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes this different from a pentest
&lt;/h2&gt;

&lt;p&gt;A pentest is a snapshot. It tells you what's wrong at one point in time, after you've already built it. Over 75% of vulnerabilities are introduced during design and development. A pentest just tells you about them after the fact.&lt;/p&gt;

&lt;p&gt;Trent runs continuously. Every change you make, every feature you add, the assessment updates. You catch issues while you're still building, not after you've shipped.&lt;/p&gt;

&lt;p&gt;And you don't need security expertise to use it. The findings come in plain language with specific fixes. "Your RLS policies don't cover this table" is more useful than "finding: authorization bypass, severity: high."&lt;/p&gt;

&lt;h2&gt;
  
  
  Get started
&lt;/h2&gt;

&lt;p&gt;Set up takes a few minutes: &lt;a href="https://trent.ai/solutions/lovable-security/" rel="noopener noreferrer"&gt;trent.ai/solutions/lovable-security&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You build. Trent secures.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Built by &lt;a href="https://trent.ai" rel="noopener noreferrer"&gt;Trent AI&lt;/a&gt;. AI security for your agents.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>lovable</category>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>How to Audit Your OpenClaw Setup for Security Risks in Under 5 Minutes</title>
      <dc:creator>George Psistakis</dc:creator>
      <pubDate>Thu, 16 Apr 2026 15:36:43 +0000</pubDate>
      <link>https://dev.to/trent-ai/how-to-audit-your-openclaw-setup-for-security-risks-in-under-5-minutes-3la7</link>
      <guid>https://dev.to/trent-ai/how-to-audit-your-openclaw-setup-for-security-risks-in-under-5-minutes-3la7</guid>
      <description>&lt;p&gt;OpenClaw's configuration surface is bigger than most users realize. Secrets in plaintext, overly permissive access policies, unsafe gateway exposure, tool permissions that give agents more power than intended. These sit in your setup and do nothing until they become a problem.&lt;/p&gt;

&lt;p&gt;We built a security assessment skill that runs directly inside OpenClaw. No external dashboards, no switching tools. You install it like any other skill and ask your agent to audit your setup.&lt;/p&gt;

&lt;h2&gt;
  
  
  What it checks
&lt;/h2&gt;

&lt;p&gt;The assessment analyzes how your OpenClaw environment is configured, what's exposed, and where policies are too loose. Specifically:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Secrets in plaintext.&lt;/strong&gt; API keys and tokens stored in configuration files instead of environment variables or secret managers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Overly permissive access policies.&lt;/strong&gt; Tool permissions that give agents more power than intended.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unsafe gateway exposure.&lt;/strong&gt; Is your gateway bound to &lt;code&gt;0.0.0.0&lt;/code&gt;? Anyone who can reach the host can interact with your agent.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Silent validation failures.&lt;/strong&gt; Configuration issues that don't produce errors but create exploitable gaps.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Chained attack paths.&lt;/strong&gt; Where multiple individually-acceptable configurations combine to create an unacceptable risk.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That last one is worth pausing on. A skill with file read access is fine on its own. A gateway with a broad binding might be fine in isolation. Together, they create a path from external network access to your local filesystem. This doesn't show up in a code scan or a dependency audit. It shows up when you reason about the system as a whole.&lt;/p&gt;

&lt;h2&gt;
  
  
  What you get back
&lt;/h2&gt;

&lt;p&gt;Findings grouped by severity: Critical, High, Medium, Low. Each finding mapped to the specific part of your setup that's affected. Recommended fixes you can apply directly.&lt;/p&gt;

&lt;p&gt;For example, the assessment might flag that your workspace directory is group-writeable on a multi-user system, which could allow malicious skill injection. Or that an installed skill has permissions it doesn't need.&lt;/p&gt;

&lt;h2&gt;
  
  
  Install
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npx clawhub &lt;span class="nb"&gt;install &lt;/span&gt;trentclaw
openclaw config &lt;span class="nb"&gt;set &lt;/span&gt;skills.entries.trent-openclaw-security.apiKey YOUR_TRENT_API_KEY
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get your API key at &lt;a href="https://trent.ai/openclaw/" rel="noopener noreferrer"&gt;trent.ai/openclaw&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Then start a new agent session and ask:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Audit my OpenClaw setup for security risks using trent
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Takes under 5 minutes. Secrets never leave your machine. API keys, tokens, and passwords are redacted as &lt;code&gt;[REDACTED]&lt;/code&gt; before anything is sent to our servers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why open source
&lt;/h2&gt;

&lt;p&gt;The source is on GitHub: &lt;a href="https://github.com/trnt-ai/trent-openclaw-security-assessment" rel="noopener noreferrer"&gt;github.com/trnt-ai/trent-openclaw-security-assessment&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Security tooling should be inspectable. The OpenClaw ecosystem is moving fast enough that the people building it will encounter edge cases we haven't anticipated. Open source means you can verify what the tool does, report issues, and extend it for your environment.&lt;/p&gt;

&lt;p&gt;Also on ClawHub: &lt;a href="https://clawhub.ai/trent-ai-release/trentclaw" rel="noopener noreferrer"&gt;clawhub.ai/trent-ai-release/trentclaw&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Built by &lt;a href="https://trent.ai" rel="noopener noreferrer"&gt;Trent AI&lt;/a&gt;. We build security tools for agentic systems.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>ai</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
