DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I ran 60 cryptanalysis experiments on SHA-256. Here's what I found.

I ran 60 cryptanalysis experiments on SHA-256. Here's what I found.

Comments
2 min read
Auditing Claude Code: what I found and how I contained it

Auditing Claude Code: what I found and how I contained it

Comments
2 min read
Auth0 — The Identity Tax

Auth0 — The Identity Tax

1
Comments 1
3 min read
Anthropic says MCP command execution is expected behavior — here is how to test what that means for your agent

Anthropic says MCP command execution is expected behavior — here is how to test what that means for your agent

Comments 2
5 min read
Proof-of-Behavior: The Missing Trust Layer for AI Agents

Proof-of-Behavior: The Missing Trust Layer for AI Agents

Comments
2 min read
🚀 I Built an Ethical Hacking Scanner Tool – Open Source Project

🚀 I Built an Ethical Hacking Scanner Tool – Open Source Project

Comments 3
1 min read
How to Self-Host Vaultwarden with Docker

How to Self-Host Vaultwarden with Docker

Comments
7 min read
You're Not Ready for Agentic AI. That's OK.

You're Not Ready for Agentic AI. That's OK.

Comments
4 min read
I built a TOTP toolkit for Node.js that covers real use cases

I built a TOTP toolkit for Node.js that covers real use cases

Comments
1 min read
CSRF. The Bug That Looks Like Legitimate Traffic

CSRF. The Bug That Looks Like Legitimate Traffic

Comments 1
8 min read
Actively Exploited Adobe CVE, Supply Chain Malware, & Self-hosted Certs

Actively Exploited Adobe CVE, Supply Chain Malware, & Self-hosted Certs

Comments
3 min read
Weekend Build Recap: Trust-Aware API Access with OpenID Federation

Weekend Build Recap: Trust-Aware API Access with OpenID Federation

Comments
2 min read
Why Real-Time Prompt Filtering Is Critical for AI Data Security in 2026

Why Real-Time Prompt Filtering Is Critical for AI Data Security in 2026

1
Comments
7 min read
SPF Records Explained: Prevent Email Spoofing with Sender Policy Framework

SPF Records Explained: Prevent Email Spoofing with Sender Policy Framework

Comments
7 min read
DKIM Explained: How Email Digital Signatures Protect Your Domain

DKIM Explained: How Email Digital Signatures Protect Your Domain

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.