DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Satellite Tailscale — Ep.5

Satellite Tailscale — Ep.5

Comments
5 min read
RSA Conference 2026: The Week Vibe Coding Security Became Impossible to Ignore

RSA Conference 2026: The Week Vibe Coding Security Became Impossible to Ignore

Comments
3 min read
What If Your Banking App Could Run a Referendum?

What If Your Banking App Could Run a Referendum?

Comments
3 min read
How We Built a Tamper-Evident Audit Trail for AI Agents

How We Built a Tamper-Evident Audit Trail for AI Agents

Comments
3 min read
I built a cryptographic trust registry for AI agents — here's how it works

I built a cryptographic trust registry for AI agents — here's how it works

Comments
2 min read
I can't whisper

I can't whisper

Comments
3 min read
Your Dockerfile Scanner Should Break the Build

Your Dockerfile Scanner Should Break the Build

Comments
2 min read
AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.

AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.

Comments
7 min read
How We Ensured API Keys Never Linger in RAM

How We Ensured API Keys Never Linger in RAM

2
Comments
3 min read
I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included

I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included

Comments
10 min read
When a Simple Security Audit Turns Into a 3-Hour Python Environment Battle (And How We Won)

When a Simple Security Audit Turns Into a 3-Hour Python Environment Battle (And How We Won)

Comments
3 min read
We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

Comments
10 min read
Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

1
Comments
3 min read
Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Comments
14 min read
Hello Noir! [Part 2]

Hello Noir! [Part 2]

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.