DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Trinity Protocol is Live: The Technical Deep Dive Into Real Multi-Chain Consensus

Trinity Protocol is Live: The Technical Deep Dive Into Real Multi-Chain Consensus

Comments 3
8 min read
I Was Tired of Awful Online Cipher Tools, So I Built the One I Always Wanted

I Was Tired of Awful Online Cipher Tools, So I Built the One I Always Wanted

Comments
4 min read
BIP-39 and web3 wallet seed phrases: A high-level overview.

BIP-39 and web3 wallet seed phrases: A high-level overview.

1
Comments
3 min read
Dev.to Tag Hacking

Dev.to Tag Hacking

5
Comments 2
3 min read
Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt

Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt

Comments
4 min read
MCP Weekly: Security and Large-Scale Enterprise Integration

MCP Weekly: Security and Large-Scale Enterprise Integration

27
Comments 2
7 min read
Prompt injection with web browsers!

Prompt injection with web browsers!

Comments
2 min read
Building Composable RLS: Enterprise Data Security on Autopilot

Building Composable RLS: Enterprise Data Security on Autopilot

3
Comments
2 min read
Building SafeScript: Our Journey Creating a Security Tool for AI-Generated Code

Building SafeScript: Our Journey Creating a Security Tool for AI-Generated Code

Comments
4 min read
Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

2
Comments
7 min read
Anyone Can Commit Code as You on GitHub (Here's How to Stop Them)

Anyone Can Commit Code as You on GitHub (Here's How to Stop Them)

118
Comments 39
7 min read
Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Comments
18 min read
Self-Sovereign Identity's Privacy Blind Spot: Why DIDs Need Confidential Computing

Self-Sovereign Identity's Privacy Blind Spot: Why DIDs Need Confidential Computing

6
Comments 3
3 min read
The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

Comments
2 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.