DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
GHSA-GW32-9RMW-QWWW: Svelte SSR XSS: The Textarea Trap

GHSA-GW32-9RMW-QWWW: Svelte SSR XSS: The Textarea Trap

Comments
2 min read
How Opencode Just Dethroned Claude

How Opencode Just Dethroned Claude

7
Comments
2 min read
🖐️Top 5 secure OpenClaw Alternatives you should consider 👀

🖐️Top 5 secure OpenClaw Alternatives you should consider 👀

26
Comments 2
7 min read
YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Wazuh: The Open-Source SIEM That Beats Splunk (And It's Completely Free)

Wazuh: The Open-Source SIEM That Beats Splunk (And It's Completely Free)

Comments
3 min read
GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

Comments
2 min read
Physical Proof of Proximity (PoPI): Making Sybil Attacks Physically Expensive

Physical Proof of Proximity (PoPI): Making Sybil Attacks Physically Expensive

1
Comments
3 min read
Claude Code Deleted a User's Entire Home Directory. Here's What I Built to Prevent It.

Claude Code Deleted a User's Entire Home Directory. Here's What I Built to Prevent It.

Comments
6 min read
Sharing my hands-on Enterprise Cloud Platform project

Sharing my hands-on Enterprise Cloud Platform project

Comments
2 min read
How to create OTP flow system on Node.js (step-by- step)

How to create OTP flow system on Node.js (step-by- step)

1
Comments
3 min read
CVE-2025-8217: Amazon Q's Self-Sabotage: The Backdoor That Couldn't Code

CVE-2025-8217: Amazon Q's Self-Sabotage: The Backdoor That Couldn't Code

Comments
2 min read
How We Made 'One CPU, One Vote' Actually Work (After 17 Years of Broken Promises)

How We Made 'One CPU, One Vote' Actually Work (After 17 Years of Broken Promises)

Comments
10 min read
Production-Grade Container Hardening

Production-Grade Container Hardening

1
Comments
6 min read
How to Architect Secure AI Agents Before They Architect Your Incident

How to Architect Secure AI Agents Before They Architect Your Incident

2
Comments
5 min read
Analytics without surveillance consent gates and local boundaries

Analytics without surveillance consent gates and local boundaries

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.