DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I built an open-source LLM security scanner that runs in <5ms with zero dependencies

I built an open-source LLM security scanner that runs in <5ms with zero dependencies

Comments
1 min read
Zero Trust for AI Agents: Why We Added Tiered Membership to Our Network

Zero Trust for AI Agents: Why We Added Tiered Membership to Our Network

Comments
4 min read
Cloud-Native Authentication Patterns for Web Apps

Cloud-Native Authentication Patterns for Web Apps

1
Comments
2 min read
Complete Guide to GitHub Actions 2026 Security Roadmap — Dependency Locking, Native Egress Firewall, and Scoped Secrets

Complete Guide to GitHub Actions 2026 Security Roadmap — Dependency Locking, Native Egress Firewall, and Scoped Secrets

Comments
8 min read
The YOLO Attack: how hackers are hijacking AI agents by flipping one switch

The YOLO Attack: how hackers are hijacking AI agents by flipping one switch

Comments 1
6 min read
I Audited 13 AI Agent Platforms for Security Misconfigurations — Here's the Open-Source Scanner I Built

I Audited 13 AI Agent Platforms for Security Misconfigurations — Here's the Open-Source Scanner I Built

Comments
3 min read
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program

Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program

Comments
4 min read
The Dual-Signal Governor: A Control-Plane Pattern for Drift-Aware Systems

The Dual-Signal Governor: A Control-Plane Pattern for Drift-Aware Systems

1
Comments
4 min read
Case Study: How I Removed Regenerating WordPress Malware Disguised as “System-Control”

Case Study: How I Removed Regenerating WordPress Malware Disguised as “System-Control”

Comments
7 min read
ShadowStrike Phantom: Open-Source EDR Platform

ShadowStrike Phantom: Open-Source EDR Platform

Comments
1 min read
The Stranger's Handshake

The Stranger's Handshake

Comments
7 min read
How I Audited My Infra After the LiteLLM Supply Chain Attack (And What I'm Doing Differently Now)

How I Audited My Infra After the LiteLLM Supply Chain Attack (And What I'm Doing Differently Now)

Comments
7 min read
The Genie Out of the Bottle / A.I.laddin's Lamp

The Genie Out of the Bottle / A.I.laddin's Lamp

Comments
7 min read
5 Cybersecurity Mistakes I Made as a CS Student (And How You Can Avoid Them)

5 Cybersecurity Mistakes I Made as a CS Student (And How You Can Avoid Them)

Comments
2 min read
What is VPN?

What is VPN?

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.