DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The MCP God Key Problem: Why Overprivileged Credentials Are the Next Enterprise Security Crisis

The MCP God Key Problem: Why Overprivileged Credentials Are the Next Enterprise Security Crisis

Comments 1
4 min read
Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

2
Comments
21 min read
IAM Auto-Remediation: Enforcing Least Privilege Automatically

IAM Auto-Remediation: Enforcing Least Privilege Automatically

1
Comments 1
4 min read
Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

2
Comments
7 min read
CVE-2025-54136 MCPoison: Why Hosted MCP Servers Have a Smaller Attack Surface

CVE-2025-54136 MCPoison: Why Hosted MCP Servers Have a Smaller Attack Surface

Comments 1
4 min read
Your AI Wrote the Backend. Who Owns the Breach?

Your AI Wrote the Backend. Who Owns the Breach?

24
Comments 9
3 min read
Why You Need an MCP Gateway for Enterprise AI Agents

Why You Need an MCP Gateway for Enterprise AI Agents

Comments 1
4 min read
How we stopped giving our AI agents raw API keys

How we stopped giving our AI agents raw API keys

1
Comments 4
4 min read
Design-Time Safety: How Fascia's Risk Engine Blocks Unsafe Patterns Before Deployment

Design-Time Safety: How Fascia's Risk Engine Blocks Unsafe Patterns Before Deployment

Comments
2 min read
Most Webhook Signatures Are Broken

Most Webhook Signatures Are Broken

1
Comments
3 min read
Open Source Journey: Contributing to OWASP BLT

Open Source Journey: Contributing to OWASP BLT

13
Comments 2
3 min read
5 Best Practices for Securing Amazon SageMaker.

5 Best Practices for Securing Amazon SageMaker.

1
Comments
3 min read
Local File Inclusion - Forever CTF (web)

Local File Inclusion - Forever CTF (web)

1
Comments
1 min read
The Day Agents Achieved Real Authority, and What It Means for Trust

The Day Agents Achieved Real Authority, and What It Means for Trust

22
Comments 2
6 min read
You Built a Network of Snitches

You Built a Network of Snitches

Comments
11 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.