Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
applicationsecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 6
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII
#
ai
#
applicationsecurity
#
vulnerabilityinsights
15
 reactions
Comments
1
 comment
7 min read
Polyfill supply chain attack embeds malware in JavaScript CDN assets
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jun 27 '24
Polyfill supply chain attack embeds malware in JavaScript CDN assets
#
applicationsecurity
#
opensourcesecurity
#
javascript
214
 reactions
Comments
6
 comments
5 min read
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes
Elvin Seyidov
Elvin Seyidov
Elvin Seyidov
Follow
Dec 21 '25
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes
#
applicationsecurity
#
websecurity
#
django
#
cybersecurity
Comments
Add Comment
12 min read
Can machines dream of secure code? From AI hallucinations to software vulnerabilities
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 17 '23
Can machines dream of secure code? From AI hallucinations to software vulnerabilities
#
ai
#
applicationsecurity
#
javascript
10
 reactions
Comments
Add Comment
9 min read
Secure password hashing in Go
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Dec 7 '23
Secure password hashing in Go
#
applicationsecurity
#
engineering
#
go
11
 reactions
Comments
1
 comment
12 min read
360 degrees of application security with Snyk
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Apr 25 '24
360 degrees of application security with Snyk
#
applicationsecurity
3
 reactions
Comments
Add Comment
6 min read
Snyk Learn and the NIST Cybersecurity Framework (CSF)
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Mar 7 '24
Snyk Learn and the NIST Cybersecurity Framework (CSF)
#
applicationsecurity
3
 reactions
Comments
Add Comment
3 min read
Symmetric vs. asymmetric encryption: Practical Python examples
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
May 16 '24
Symmetric vs. asymmetric encryption: Practical Python examples
#
applicationsecurity
#
codesecurity
#
opensourcesecurity
#
python
3
 reactions
Comments
Add Comment
16 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 8
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
#
cybersecurity
#
osi
#
applicationsecurity
#
aiml
Comments
Add Comment
4 min read
Essential Node.js backend examples for developers in 2024
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jun 13 '24
Essential Node.js backend examples for developers in 2024
#
applicationsecurity
#
codesecurity
#
javascript
#
node
6
 reactions
Comments
4
 comments
10 min read
A denial of service Regex breaks FastAPI security
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 1 '24
A denial of service Regex breaks FastAPI security
#
applicationsecurity
#
python
1
 reaction
Comments
Add Comment
7 min read
Agentic Container Security with Snyk MCP Server
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 14 '25
Agentic Container Security with Snyk MCP Server
#
ai
#
applicationsecurity
#
containersecurity
2
 reactions
Comments
Add Comment
4 min read
50+ Common Web Application Vulnerabilities Explained
Morris
Morris
Morris
Follow
Jan 11
50+ Common Web Application Vulnerabilities Explained
#
webapplicationsecurity
#
cybersecurity
#
webvulnerabilities
#
applicationsecurity
9
 reactions
Comments
1
 comment
17 min read
How to strengthen security in your CI/CD pipeline
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jul 13 '23
How to strengthen security in your CI/CD pipeline
#
supplychainsecurity
#
applicationsecurity
#
devsecops
#
cicd
3
 reactions
Comments
Add Comment
8 min read
Security implications of cross-origin resource sharing (CORS) in Node.js
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Sep 14 '23
Security implications of cross-origin resource sharing (CORS) in Node.js
#
applicationsecurity
#
codesecurity
#
javascript
#
node
2
 reactions
Comments
1
 comment
11 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account