DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Vercel Breach Hit One of My Projects. Here's What 10 Minutes of Cleanup Looked Like.

The Vercel Breach Hit One of My Projects. Here's What 10 Minutes of Cleanup Looked Like.

Comments
4 min read
I built a forensics documentation tool because my university course drove me crazy

I built a forensics documentation tool because my university course drove me crazy

Comments
2 min read
Adding a Trust Boundary to a LlamaIndex RAG Pipeline

Adding a Trust Boundary to a LlamaIndex RAG Pipeline

8
Comments 3
9 min read
Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy

Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy

Comments
6 min read
OAuth vs JWT: Choosing the Right Tool for Developers

OAuth vs JWT: Choosing the Right Tool for Developers

Comments
5 min read
Client-Side Price Manipulation: Pay Whatever You Want at Checkout

Client-Side Price Manipulation: Pay Whatever You Want at Checkout

Comments
4 min read
Hardening Your Deploynix Server: A Step-by-Step Security Audit

Hardening Your Deploynix Server: A Step-by-Step Security Audit

Comments
7 min read
Uncensoring AI: How to Surgically Remove an LLM's Refusal Mechanism

Uncensoring AI: How to Surgically Remove an LLM's Refusal Mechanism

1
Comments
2 min read
How AI Is Transforming Cybersecurity and Compliance — A Deep Dive into PCI DSS

How AI Is Transforming Cybersecurity and Compliance — A Deep Dive into PCI DSS

Comments
7 min read
Escaping Pilot Purgatory: How Semantix-ai v0.1.5 Built the Immutable Trust Layer for AI Agents

Escaping Pilot Purgatory: How Semantix-ai v0.1.5 Built the Immutable Trust Layer for AI Agents

Comments
7 min read
Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Comments
1 min read
CVE-2024-6387: Critical OpenSSH Vulnerability Allowing Root Access

CVE-2024-6387: Critical OpenSSH Vulnerability Allowing Root Access

Comments
11 min read
How Bash Command Safety Analysis Works in AI Systems

How Bash Command Safety Analysis Works in AI Systems

Comments
5 min read
MCP has no security model. Here's how to fix it in 2 minutes.

MCP has no security model. Here's how to fix it in 2 minutes.

Comments
4 min read
DeFi Security Weekly: Privacy Under Attack, Wallet Vulnerabilities, and Infrastructure Trust Crisis

DeFi Security Weekly: Privacy Under Attack, Wallet Vulnerabilities, and Infrastructure Trust Crisis

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.