DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AI Agents Don’t Hesitate And That’s a Security Problem

AI Agents Don’t Hesitate And That’s a Security Problem

3
Comments
3 min read
Why Your AI Chatbot Needs Governance Before It Needs Features

Why Your AI Chatbot Needs Governance Before It Needs Features

Comments
7 min read
JGuardrails 1.0.0 — Hardening Java LLM Apps Against Jailbreaks, Toxicity, and Prompt Injection

JGuardrails 1.0.0 — Hardening Java LLM Apps Against Jailbreaks, Toxicity, and Prompt Injection

Comments
7 min read
Salesforce Permission Sets: The Complete Guide for 2026

Salesforce Permission Sets: The Complete Guide for 2026

1
Comments
6 min read
The Credential Nobody Owned

The Credential Nobody Owned

Comments
7 min read
Brave Passkeys: Clean WebAuthn, Messy UX

Brave Passkeys: Clean WebAuthn, Messy UX

Comments
3 min read
OAuth Token Vault Patterns for AI Agents

OAuth Token Vault Patterns for AI Agents

1
Comments
7 min read
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics

The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics

Comments
3 min read
ShieldCortex: What We Learned Protecting AI Agent Memory

ShieldCortex: What We Learned Protecting AI Agent Memory

Comments
6 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

1
Comments
4 min read
Understanding Linux Network Namespaces: How Containers Isolate and Connect Networks

Understanding Linux Network Namespaces: How Containers Isolate and Connect Networks

Comments
4 min read
The Vibe Coding Security Checklist: 7 Things to Check Before You Ship

The Vibe Coding Security Checklist: 7 Things to Check Before You Ship

Comments
5 min read
Fintech Backend Architecture: Building Systems That Don't Break (When Money Is Involved)

Fintech Backend Architecture: Building Systems That Don't Break (When Money Is Involved)

Comments
7 min read
SQL Injection in Cursor-Generated Code: What Gets Missed

SQL Injection in Cursor-Generated Code: What Gets Missed

1
Comments
3 min read
Claude Mythos Is the First AI to Complete a Full Corporate Cyberattack End-to-End

Claude Mythos Is the First AI to Complete a Full Corporate Cyberattack End-to-End

40
Comments 1
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.