DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Demystifying SAST for IaC: How Does Checkov Actually Work Under the Hood?

Demystifying SAST for IaC: How Does Checkov Actually Work Under the Hood?

4
Comments 1
3 min read
Security+ started, 3 tools built, real attacks found on my own machine

Security+ started, 3 tools built, real attacks found on my own machine

Comments
3 min read
I found a critical CVE in a top AI agent framework. Here's what it taught me about how we're all building agents wrong.

I found a critical CVE in a top AI agent framework. Here's what it taught me about how we're all building agents wrong.

Comments
3 min read
CVE-2026-40871 Mailcow SQLi, Vercel Breach & TPM 2.0 Hardware Attestation

CVE-2026-40871 Mailcow SQLi, Vercel Breach & TPM 2.0 Hardware Attestation

Comments
3 min read
How I Built a Free Anonymous Email Service — No Phone, No Password, No Logs

How I Built a Free Anonymous Email Service — No Phone, No Password, No Logs

Comments
3 min read
Let AI fix your CI" is a supply chain attack waiting to happen. Here's how to do it safely

Let AI fix your CI" is a supply chain attack waiting to happen. Here's how to do it safely

Comments
3 min read
Engineering the Guardian: A Deep Dive into Atomic API Guardrails and Real-Time Systems

Engineering the Guardian: A Deep Dive into Atomic API Guardrails and Real-Time Systems

1
Comments
3 min read
Governance metadata in A2A Agent Cards, shipping the superset

Governance metadata in A2A Agent Cards, shipping the superset

Comments
2 min read
SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume

SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume

Comments
5 min read
Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Comments
8 min read
TOCTOU of Trust: Why Agent Governance Must Be Continuous

TOCTOU of Trust: Why Agent Governance Must Be Continuous

1
Comments
8 min read
I Built the Middleware Layer MCP is Missing

I Built the Middleware Layer MCP is Missing

Comments
3 min read
Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Comments
11 min read
Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Comments
4 min read
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.