DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
đź‘» Living Off The Land Evasion

đź‘» Living Off The Land Evasion

Comments
5 min read
Logtide 0.6.0: PII Masking, Keyboard Shortcuts & Anomaly Detection

Logtide 0.6.0: PII Masking, Keyboard Shortcuts & Anomaly Detection

9
Comments 2
4 min read
I build payload-guard-filter

I build payload-guard-filter

Comments
4 min read
InALign: Tamper-Proof Audit Trails for AI Agents

InALign: Tamper-Proof Audit Trails for AI Agents

Comments
3 min read
Inspecting HTTP Headers to Diagnose Caching and Authentication Issues

Inspecting HTTP Headers to Diagnose Caching and Authentication Issues

1
Comments
5 min read
3 SQL Queries to Find Hidden WordPress Backdoors (When Plugins Fail)

3 SQL Queries to Find Hidden WordPress Backdoors (When Plugins Fail)

1
Comments
3 min read
Stop Hardcoding Security Headers: Automate Your CDN Security with YAML

Stop Hardcoding Security Headers: Automate Your CDN Security with YAML

5
Comments
3 min read
How to Detect ERC4626 First Depositor Attack: A Security Researcher's Guide

How to Detect ERC4626 First Depositor Attack: A Security Researcher's Guide

Comments
5 min read
How VS Code Copilot Chat Premium Features Leak into Subagents (and Why It Matters)

How VS Code Copilot Chat Premium Features Leak into Subagents (and Why It Matters)

1
Comments
7 min read
Security: The Thing That Everyone Loves to Hate

Security: The Thing That Everyone Loves to Hate

Comments
5 min read
A Developer-Friendly Way to Mask API Tokens Without Losing Context

A Developer-Friendly Way to Mask API Tokens Without Losing Context

Comments
3 min read
The Replit AI Incident Wasn’t a Prompt Problem. It Was a Trust Problem.

The Replit AI Incident Wasn’t a Prompt Problem. It Was a Trust Problem.

Comments
7 min read
IAM Users vs Groups vs Roles: Explained for Data Analysts

IAM Users vs Groups vs Roles: Explained for Data Analysts

Comments
7 min read
Your IDE is an Attack Vector

Your IDE is an Attack Vector

25
Comments 16
5 min read
Why Your Video Tool's Source Code Matters More Than Its Privacy Policy

Why Your Video Tool's Source Code Matters More Than Its Privacy Policy

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.