DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Your API Rate-Limit Is Useless Against Distributed Attacks

Your API Rate-Limit Is Useless Against Distributed Attacks

Comments
8 min read
The Supply Chain Attack That's Already In Your Codebase

The Supply Chain Attack That's Already In Your Codebase

Comments
6 min read
What LLM Guardrails Don't Cover (And What AI Governance Actually Requires)

What LLM Guardrails Don't Cover (And What AI Governance Actually Requires)

Comments
8 min read
SQL Injection – UNION attack, retrieving multiple values in a single column | PortSwigger Lab Note #5

SQL Injection – UNION attack, retrieving multiple values in a single column | PortSwigger Lab Note #5

5
Comments
1 min read
🔐 Why a GitHub-Based Store? — Security and Community Sharing for Local AI Agents

🔐 Why a GitHub-Based Store? — Security and Community Sharing for Local AI Agents

Comments
3 min read
I Got Sick of Getting Rugged, So I Built a Rug-Pull Detection Engine in Rust

I Got Sick of Getting Rugged, So I Built a Rug-Pull Detection Engine in Rust

2
Comments
6 min read
The 73% Problem: Why Enterprise Prompt Injection Fixes Don't Work (And What Actually Does)

The 73% Problem: Why Enterprise Prompt Injection Fixes Don't Work (And What Actually Does)

Comments
6 min read
WebRTC Leaks: Why Even Premium Residential Proxies Are Getting Detected in 2026

WebRTC Leaks: Why Even Premium Residential Proxies Are Getting Detected in 2026

1
Comments
11 min read
How to Detect Compromised Dependencies in Your CI/CD Pipeline Before They Deploy to Production

How to Detect Compromised Dependencies in Your CI/CD Pipeline Before They Deploy to Production

1
Comments
6 min read
Why I ditched "Soft Deletes" for S3: Building a Physical Purge Workflow

Why I ditched "Soft Deletes" for S3: Building a Physical Purge Workflow

1
Comments
2 min read
I built a free dev tools site after almost leaking my staging credentials into a "popular" online JWT decoder

I built a free dev tools site after almost leaking my staging credentials into a "popular" online JWT decoder

Comments
1 min read
How to Detect Compromised Dependencies in Your CI/CD Pipeline: The Supply Chain Trust Paradox

How to Detect Compromised Dependencies in Your CI/CD Pipeline: The Supply Chain Trust Paradox

Comments
7 min read
FAQ: Supply-Chain Attacks — 10 Questions You're Asking (And Answers That Matter)

FAQ: Supply-Chain Attacks — 10 Questions You're Asking (And Answers That Matter)

1
Comments
7 min read
Automated Secret Rotation: How to Prevent Credential Sprawl Without Breaking CI/CD

Automated Secret Rotation: How to Prevent Credential Sprawl Without Breaking CI/CD

Comments
6 min read
Authentication vs Authorization

Authentication vs Authorization

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.