DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I built a free dev tools site after almost leaking my staging credentials into a "popular" online JWT decoder

I built a free dev tools site after almost leaking my staging credentials into a "popular" online JWT decoder

Comments
1 min read
How to Detect Compromised Dependencies in Your CI/CD Pipeline: The Supply Chain Trust Paradox

How to Detect Compromised Dependencies in Your CI/CD Pipeline: The Supply Chain Trust Paradox

Comments
7 min read
Automated Secret Rotation: How to Prevent Credential Sprawl Without Breaking CI/CD

Automated Secret Rotation: How to Prevent Credential Sprawl Without Breaking CI/CD

Comments
6 min read
FAQ: Supply-Chain Attacks — 10 Questions You're Asking (And Answers That Matter)

FAQ: Supply-Chain Attacks — 10 Questions You're Asking (And Answers That Matter)

1
Comments
7 min read
Authentication vs Authorization

Authentication vs Authorization

1
Comments
2 min read
Kubernetes Security Best Practices: Protecting Your Containerized Applications

Kubernetes Security Best Practices: Protecting Your Containerized Applications

Comments
2 min read
GitGuardian MCP: Secret Scanning as a Hard Merge Gate for AI-Generated Code

GitGuardian MCP: Secret Scanning as a Hard Merge Gate for AI-Generated Code

1
Comments
4 min read
Self-Mutating AI Malware — Why Traditional Antivirus Is Dead

Self-Mutating AI Malware — Why Traditional Antivirus Is Dead

Comments
4 min read
API Security Is Broken — And Attackers Know It

API Security Is Broken — And Attackers Know It

Comments
4 min read
Prompt Chainmail: Workflows and integration examples - part 2

Prompt Chainmail: Workflows and integration examples - part 2

1
Comments
5 min read
How API Rotation Attacks Expose Your Credentials — And Why Your Rate Limiting Fails

How API Rotation Attacks Expose Your Credentials — And Why Your Rate Limiting Fails

Comments
4 min read
GWLB in Production: 9 Pitfalls That Break Your Firewall Architecture

GWLB in Production: 9 Pitfalls That Break Your Firewall Architecture

1
Comments
13 min read
AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines

AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines

Comments
6 min read
Zero-Trust for AI Agents: The Critical Blind Spot in Enterprise Security

Zero-Trust for AI Agents: The Critical Blind Spot in Enterprise Security

Comments
8 min read
Context Planes: Why AI Agents Need Verification Layers (And How They're Getting It Wrong)

Context Planes: Why AI Agents Need Verification Layers (And How They're Getting It Wrong)

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.