DEV Community

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Ghost Platforms That Broke Our Payment Rails and How We Unchained Ourselves

The Ghost Platforms That Broke Our Payment Rails and How We Unchained Ourselves

Comments
3 min read
Platform Lockdowns Will Doom Your Business

Platform Lockdowns Will Doom Your Business

1
Comments
2 min read
The Egregious Cost of Compliance: One Platform's Overly Broad Restrictions

The Egregious Cost of Compliance: One Platform's Overly Broad Restrictions

Comments
2 min read
Unchaining Freelance Commerce in Nigeria Was Not Just About Payments

Unchaining Freelance Commerce in Nigeria Was Not Just About Payments

Comments
3 min read
The Dark Side of Standardized E-commerce Solutions for Global Creators

The Dark Side of Standardized E-commerce Solutions for Global Creators

Comments
2 min read
The Shai-Hulud Worm Is Now Open Source — Here's How to Stop Self-Replicating Prompts Before They Reach Your LLM

The Shai-Hulud Worm Is Now Open Source — Here's How to Stop Self-Replicating Prompts Before They Reach Your LLM

1
Comments
5 min read
Hidden Audio Attacks on Voice AI: How Transcription Pipelines Get Hijacked

Hidden Audio Attacks on Voice AI: How Transcription Pipelines Get Hijacked

Comments
4 min read
Your Okta Is Only As Strong As Your SIM Card

Your Okta Is Only As Strong As Your SIM Card

Comments
3 min read
Modernising a 6-Year-Old Spring Boot Project Without Breaking Everything

Modernising a 6-Year-Old Spring Boot Project Without Breaking Everything

Comments
8 min read
I Dusted Off a 6-Year-Old Java Project and Ran Snyk Against It — Here's What I Found

I Dusted Off a 6-Year-Old Java Project and Ran Snyk Against It — Here's What I Found

Comments
9 min read
GraphQL Authorization Bypass: A Real CVE Code Review

GraphQL Authorization Bypass: A Real CVE Code Review

1
Comments 1
9 min read
The 26-Dimensional Feature Vector: How a Machine Learns to Recognise a Secret

The 26-Dimensional Feature Vector: How a Machine Learns to Recognise a Secret

Comments
9 min read
Why the Variable Name Is the Most Important Feature in Secrets Detection

Why the Variable Name Is the Most Important Feature in Secrets Detection

Comments
8 min read
We scanned 50+ MCP servers and found HIGH-severity bugs in Atlassian, GitHub, Cloudflare, and Microsoft — here's what we learned

We scanned 50+ MCP servers and found HIGH-severity bugs in Atlassian, GitHub, Cloudflare, and Microsoft — here's what we learned

1
Comments 1
4 min read
Skill files are the new supply chain attack surface. Your CI pipeline does not know that yet.

Skill files are the new supply chain attack surface. Your CI pipeline does not know that yet.

1
Comments 2
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.