DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Is Cursor Safe? I Scanned 100 Apps. 67% Had Critical Vulns.

Is Cursor Safe? I Scanned 100 Apps. 67% Had Critical Vulns.

2
Comments 3
5 min read
Semgrep Observability with OpenTelemetry

Semgrep Observability with OpenTelemetry

Comments
4 min read
Why I replaced a 3MB "Burn-after-reading" tool with my own 30KB Phoenix engine

Why I replaced a 3MB "Burn-after-reading" tool with my own 30KB Phoenix engine

Comments
1 min read
Anthropic accidentally published Claude Code's source code. Here's the part nobody's talking about.

Anthropic accidentally published Claude Code's source code. Here's the part nobody's talking about.

2
Comments
4 min read
I Analyzed All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

I Analyzed All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

2
Comments
24 min read
A Vague Rumor Found Real 0-Days in Vim and Emacs. Here's Why It Worked.

A Vague Rumor Found Real 0-Days in Vim and Emacs. Here's Why It Worked.

Comments
4 min read
Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Comments
5 min read
Welcome to Transitive Dependency Hell

Welcome to Transitive Dependency Hell

Comments
5 min read
Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Comments
11 min read
Blind `npm install` Execution Risks Security Vulnerabilities: Review Lockfiles to Mitigate Threats

Blind `npm install` Execution Risks Security Vulnerabilities: Review Lockfiles to Mitigate Threats

Comments
10 min read
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

Comments
4 min read
Your Agent Monitoring SDK Was the Backdoor

Your Agent Monitoring SDK Was the Backdoor

Comments
10 min read
Security Is a Myth | The Axios Supply Chain Attack

Security Is a Myth | The Axios Supply Chain Attack

Comments
5 min read
Volt Typhoon Weaponized SOHO Routers at Scale — Here's Your Zero-Trust Playbook for the Remote Edge

Volt Typhoon Weaponized SOHO Routers at Scale — Here's Your Zero-Trust Playbook for the Remote Edge

Comments
6 min read
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Comments
10 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.