DEV Community

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What AppSec Engineers Actually Do (and Why It Matters)

What AppSec Engineers Actually Do (and Why It Matters)

Comments
7 min read
If Your Security Scanner Can't See Attack Chains, You're Flying Blind

If Your Security Scanner Can't See Attack Chains, You're Flying Blind

Comments
5 min read
What Government Data Breaches Teach Us About Access Control

What Government Data Breaches Teach Us About Access Control

Comments
5 min read
Secure System Design -- 14 Challenges

Secure System Design -- 14 Challenges

Comments
31 min read
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners

From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners

Comments
3 min read
Are You Still Checking Binary Hardening by Hand? I Built bincheck in Rust

Are You Still Checking Binary Hardening by Hand? I Built bincheck in Rust

Comments
2 min read
Execute First, Ask Never: A Vulnerability in snyk-agent-scan

Execute First, Ask Never: A Vulnerability in snyk-agent-scan

2
Comments
8 min read
From Alert Lists to Exploit Graphs: How Auditor Core Changes the Security Calculus

From Alert Lists to Exploit Graphs: How Auditor Core Changes the Security Calculus

Comments
5 min read
Subdomain Takeover is Not Just Phishing: How Acronis Nearly Lost Authenticated API Access

Subdomain Takeover is Not Just Phishing: How Acronis Nearly Lost Authenticated API Access

Comments
6 min read
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time

Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time

Comments
5 min read
Why I Built CVE Lite CLI: Moving From "Security Debt" to Real-Time Scanning

Why I Built CVE Lite CLI: Moving From "Security Debt" to Real-Time Scanning

1
Comments
4 min read
The New Wave of Accessibility-Service Malware Explained

The New Wave of Accessibility-Service Malware Explained

1
Comments 1
1 min read
Why Device Binding Fails — And How Attackers Bypass It

Why Device Binding Fails — And How Attackers Bypass It

Comments
1 min read
NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

Comments
5 min read
A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.