DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
On-Device AI in a Health App: How I Keep User Data Private

On-Device AI in a Health App: How I Keep User Data Private

Comments
5 min read
From Prompts to Programs: The Promise and Problem of AI-Generated Code

From Prompts to Programs: The Promise and Problem of AI-Generated Code

Comments
3 min read
Request to Participate and Share Academic Survey on Code Review in OSS Security

Request to Participate and Share Academic Survey on Code Review in OSS Security

Comments
1 min read
🛡️ Securing Clawdbot (Moltbot): Essential Hardening for AI Agents with System Access

🛡️ Securing Clawdbot (Moltbot): Essential Hardening for AI Agents with System Access

Comments
3 min read
🦀 Rust Weekly Log — CRC, Entropy, and Hexagonal Architecture

🦀 Rust Weekly Log — CRC, Entropy, and Hexagonal Architecture

Comments
1 min read
RFC 8693 Deep Dive: Token Exchange

RFC 8693 Deep Dive: Token Exchange

2
Comments
10 min read
I Built a Free WAF for Laravel — Here's How It Works

I Built a Free WAF for Laravel — Here's How It Works

2
Comments
2 min read
GHSA-GPX9-96J6-PP87: The Call Is Coming From Inside The Container: TaskWeaver's Docker Escape

GHSA-GPX9-96J6-PP87: The Call Is Coming From Inside The Container: TaskWeaver's Docker Escape

Comments
2 min read
🚨 ClawdBot (Moltbot): Powerful AI Agents, Real Automation… and Real Risks

🚨 ClawdBot (Moltbot): Powerful AI Agents, Real Automation… and Real Risks

Comments
3 min read
Clickjacking — when your users click things they never meant to

Clickjacking — when your users click things they never meant to

1
Comments
1 min read
Gerenciamento de Atualizações e Evolução Contínua de Software com IA

Gerenciamento de Atualizações e Evolução Contínua de Software com IA

Comments
15 min read
OWASP Top 10 – A04: Insecure Design (Remediation Perspective)

OWASP Top 10 – A04: Insecure Design (Remediation Perspective)

Comments
2 min read
đź”’ The Hidden Cost of Dependency Confusion

đź”’ The Hidden Cost of Dependency Confusion

Comments
4 min read
Your AI Agent Knows Your Passwords — Here's How I Fixed It

Your AI Agent Knows Your Passwords — Here's How I Fixed It

6
Comments 9
4 min read
Don’t Trust Your Agents. Trust Your Boundary: a runtime authorization layer for LLM tool calls.

Don’t Trust Your Agents. Trust Your Boundary: a runtime authorization layer for LLM tool calls.

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.