DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Defensive Programming can be very easy with Symfony HttpClient

Defensive Programming can be very easy with Symfony HttpClient

10
Comments
1 min read
How to Attack an MCP Server — and Why Your AI Agent Will Comply

How to Attack an MCP Server — and Why Your AI Agent Will Comply

1
Comments 1
5 min read
I Built a Security Firewall for AI Agents — Here's Why Every MCP Server Needs One

I Built a Security Firewall for AI Agents — Here's Why Every MCP Server Needs One

3
Comments
4 min read
Your SSH Keys Are Naked and It's Your Fault

Your SSH Keys Are Naked and It's Your Fault

Comments
6 min read
JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

2
Comments
6 min read
Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

4
Comments 1
1 min read
How to Attack a RAG System — and Why Your Security Scanner Won't Catch It

How to Attack a RAG System — and Why Your Security Scanner Won't Catch It

Comments 1
6 min read
We stress-tested our own AI agent guardrails before launch. Here's what broke.

We stress-tested our own AI agent guardrails before launch. Here's what broke.

Comments 5
5 min read
How to hash passwords before saving it on database in Node.js

How to hash passwords before saving it on database in Node.js

1
Comments 2
2 min read
How to Measure Passkey Adoption: Funnels, Activation, and Device Insights

How to Measure Passkey Adoption: Funnels, Activation, and Device Insights

Comments
3 min read
Secure Remote Access to AWS Resources from On-Premises

Secure Remote Access to AWS Resources from On-Premises

6
Comments
2 min read
🔑 Cloud Policy Abuse: The IAM Blind Spot

🔑 Cloud Policy Abuse: The IAM Blind Spot

Comments
6 min read
Sub-Table Security

Sub-Table Security

Comments
12 min read
Linux 서버 보안 모델 완벽 가이드 - 시크릿 관리와 프로세스 격리

Linux 서버 보안 모델 완벽 가이드 - 시크릿 관리와 프로세스 격리

Comments
3 min read
A Practical Guide to Production-Ready Auth (For Senior Full-Stack Devs)

A Practical Guide to Production-Ready Auth (For Senior Full-Stack Devs)

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.