DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Aider + OpenClaw: How Autonomous Exploit Generators Rewrite the Rules of Security Research

Aider + OpenClaw: How Autonomous Exploit Generators Rewrite the Rules of Security Research

2
Comments
4 min read
Every protocol your agent speaks, scanned

Every protocol your agent speaks, scanned

Comments
4 min read
I Found an API Key I Deleted 18 Months Ago Still Living in My Git History

I Found an API Key I Deleted 18 Months Ago Still Living in My Git History

Comments
5 min read
Your AI Agent Has Root Access to Your Laptop. Here's How to Fix That.

Your AI Agent Has Root Access to Your Laptop. Here's How to Fix That.

Comments 2
3 min read
Mapping AI Infrastructure to the EU AI Act and ISO 42001

Mapping AI Infrastructure to the EU AI Act and ISO 42001

3
Comments
3 min read
How We Architect AI Governance for Real-World Infrastructure

How We Architect AI Governance for Real-World Infrastructure

2
Comments
3 min read
GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

Comments
2 min read
Stop Your Coding Agent From Stealing Production Secrets

Stop Your Coding Agent From Stealing Production Secrets

6
Comments 2
6 min read
Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Comments
7 min read
AI-Generated Backends Break in Production. We Replaced Code with Specs.

AI-Generated Backends Break in Production. We Replaced Code with Specs.

Comments
3 min read
Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Comments 1
7 min read
Building a Social Platform with Client-Side End-to-End Encryption

Building a Social Platform with Client-Side End-to-End Encryption

1
Comments 1
9 min read
AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere

AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere

3
Comments
4 min read
Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

1
Comments
3 min read
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.