DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Lessons learned integrating Paddle (Sandbox to Live) & fixing DMARC as a solo dev

Lessons learned integrating Paddle (Sandbox to Live) & fixing DMARC as a solo dev

Comments
2 min read
AI Agents Run Unsandboxed Code — How to Fix It (2026)

AI Agents Run Unsandboxed Code — How to Fix It (2026)

1
Comments 1
4 min read
Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Comments
8 min read
Resolution Tracker: Secure & Scalable with GitHub Copilot CLI

GitHub Copilot CLI Challenge Submission

Resolution Tracker: Secure & Scalable with GitHub Copilot CLI

1
Comments
2 min read
Hide a tree in a forest: a messenger that pretends to be a temperature sensor

Hide a tree in a forest: a messenger that pretends to be a temperature sensor

3
Comments
7 min read
Evolution of the Android Open Source Project: A Deep Dive

Evolution of the Android Open Source Project: A Deep Dive

Comments
4 min read
AI Needs a Flight Recorder: Introducing VAP, an Open Framework for Verifiable AI Decision Trails

AI Needs a Flight Recorder: Introducing VAP, an Open Framework for Verifiable AI Decision Trails

Comments
8 min read
The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring

The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring

3
Comments
6 min read
How I detect typosquatting attacks before npm install runs

How I detect typosquatting attacks before npm install runs

Comments
2 min read
Engineering Trust: A Deep Dive into the NL2SQL Secure Execution Pipeline

Engineering Trust: A Deep Dive into the NL2SQL Secure Execution Pipeline

Comments
5 min read
Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Comments
2 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
Week 6 Quiz - Audit Crypto Bugs in Web Apps

Week 6 Quiz - Audit Crypto Bugs in Web Apps

1
Comments
66 min read
Checksums: What They Are, Why They Matter, and Where They Belong in Your Release Pipeline

Checksums: What They Are, Why They Matter, and Where They Belong in Your Release Pipeline

Comments
3 min read
Solana Passkeys on the Web (No Extension Required)

Solana Passkeys on the Web (No Extension Required)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.