Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
applicationsecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Snyk and uv, Better Together
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 25
Snyk and uv, Better Together
#
ai
#
applicationsecurity
#
codesecurity
#
python
Comments
Add Comment
3 min read
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 6
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII
#
ai
#
applicationsecurity
#
vulnerabilityinsights
15
 reactions
Comments
1
 comment
7 min read
50+ Common Web Application Vulnerabilities Explained
Morris
Morris
Morris
Follow
Jan 11
50+ Common Web Application Vulnerabilities Explained
#
webapplicationsecurity
#
cybersecurity
#
webvulnerabilities
#
applicationsecurity
9
 reactions
Comments
1
 comment
17 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 8
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
#
cybersecurity
#
osi
#
applicationsecurity
#
aiml
Comments
Add Comment
4 min read
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes
Elvin Seyidov
Elvin Seyidov
Elvin Seyidov
Follow
Dec 21 '25
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes
#
applicationsecurity
#
websecurity
#
django
#
cybersecurity
Comments
Add Comment
12 min read
Agentic Container Security with Snyk MCP Server
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 14 '25
Agentic Container Security with Snyk MCP Server
#
ai
#
applicationsecurity
#
containersecurity
2
 reactions
Comments
Add Comment
4 min read
The Hidden Costs of False Positives in Healthtech Security
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 6 '25
The Hidden Costs of False Positives in Healthtech Security
#
applicationsecurity
Comments
Add Comment
5 min read
Minimizing False Positives: Enhancing Security Efficiency
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jul 3 '25
Minimizing False Positives: Enhancing Security Efficiency
#
applicationsecurity
Comments
Add Comment
4 min read
Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jun 7 '25
Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software
#
ai
#
applicationsecurity
Comments
2
 comments
3 min read
Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)
Soumya
Soumya
Soumya
Follow
Oct 17 '24
Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)
#
sast
#
dast
#
applicationsecurity
#
jenkins
2
 reactions
Comments
1
 comment
5 min read
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 31 '24
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant
#
applicationsecurity
#
opensourcesecurity
#
java
Comments
Add Comment
4 min read
A denial of service Regex breaks FastAPI security
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 1 '24
A denial of service Regex breaks FastAPI security
#
applicationsecurity
#
python
1
 reaction
Comments
Add Comment
7 min read
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)
Mark Wireman
Mark Wireman
Mark Wireman
Follow
Jul 22 '24
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)
#
applicationsecurity
#
cloudnative
#
devops
#
security
Comments
Add Comment
8 min read
The strategic value of a Security Champions Program.
Yettsy
Yettsy
Yettsy
Follow
Jul 6 '24
The strategic value of a Security Champions Program.
#
securesoftware
#
applicationsecurity
#
securitychampion
#
webdev
Comments
Add Comment
1 min read
How to secure a REST API?
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jun 28 '24
How to secure a REST API?
#
applicationsecurity
#
codesecurity
#
opensourcesecurity
2
 reactions
Comments
Add Comment
11 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account