DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I used a security audit to harden Open Relay instead of shipping another shiny feature

I used a security audit to harden Open Relay instead of shipping another shiny feature

Comments
1 min read
Security Agents Need a Thinner Harness

Security Agents Need a Thinner Harness

Comments 1
3 min read
Safetensors Joins PyTorch Foundation: Infrastructure Growing Up

Safetensors Joins PyTorch Foundation: Infrastructure Growing Up

Comments
3 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
I Built a Tool to Detect Hidden Prompt Injections in PDFs. Here's What I Learned.

I Built a Tool to Detect Hidden Prompt Injections in PDFs. Here's What I Learned.

1
Comments
5 min read
The "Ghost" Votes of Olas Protocol: Why Lack of Sync is a Critical Economic Flaw

The "Ghost" Votes of Olas Protocol: Why Lack of Sync is a Critical Economic Flaw

Comments
2 min read
How to Pass a School District Security Questionnaire in 2026 (Before It Kills Your Deal)

How to Pass a School District Security Questionnaire in 2026 (Before It Kills Your Deal)

Comments
3 min read
6 AI Agent Security Signals From the First Week of April 2026 — And What Catches Each One

6 AI Agent Security Signals From the First Week of April 2026 — And What Catches Each One

1
Comments
4 min read
Supabase Auth OAuth in Flutter — Google, GitHub, and Apple Sign-In End-to-End

Supabase Auth OAuth in Flutter — Google, GitHub, and Apple Sign-In End-to-End

1
Comments
5 min read
Integer Overflow in Solidity 0.8+: Are We Really Safe?

Integer Overflow in Solidity 0.8+: Are We Really Safe?

Comments
4 min read
We ran 109 tests to measure how PII protection methods affect LLM output quality. Here's what we learned and what we built.

We ran 109 tests to measure how PII protection methods affect LLM output quality. Here's what we learned and what we built.

2
Comments
7 min read
Implementing AWS Security & Compliance: A Hands-On Guide to IAM, Recovery, and Governance

Implementing AWS Security & Compliance: A Hands-On Guide to IAM, Recovery, and Governance

Comments
16 min read
Enhancing Dockerized Self-Hosted Security and Resource Management to Mitigate Vulnerabilities and System Instability

Enhancing Dockerized Self-Hosted Security and Resource Management to Mitigate Vulnerabilities and System Instability

Comments
12 min read
How does SSH work and how can it be set up?

How does SSH work and how can it be set up?

6
Comments
3 min read
Understanding Common Cybersecurity Attacks: A Practical Overview

Understanding Common Cybersecurity Attacks: A Practical Overview

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.