DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
JWT security mistakes that will get you breached

JWT security mistakes that will get you breached

Comments
4 min read
Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page

Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page

Comments
6 min read
Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Comments 1
3 min read
Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters

Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters

Comments
6 min read
Your First Supabase RLS Policy, Without Exposing Your Whole Database

Your First Supabase RLS Policy, Without Exposing Your Whole Database

Comments
5 min read
Como parei de fazer deploy pra mudar permissão de usuário

Como parei de fazer deploy pra mudar permissão de usuário

1
Comments 1
3 min read
How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

1
Comments
5 min read
Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Comments
5 min read
Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Comments
3 min read
I Spent a Week Securing Webhook Ingestion. The Real Attack Surface Was Delivery.

I Spent a Week Securing Webhook Ingestion. The Real Attack Surface Was Delivery.

Comments
6 min read
194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

Comments
1 min read
Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Comments
7 min read
A $10B AI Startup Just Got Breached Through the LLM Library in Your Stack.

A $10B AI Startup Just Got Breached Through the LLM Library in Your Stack.

Comments
8 min read
What Is AI Agent Runtime Authorization?

What Is AI Agent Runtime Authorization?

Comments
3 min read
⚠️ Race Conditions in APIs - The Bug You Can’t See

⚠️ Race Conditions in APIs - The Bug You Can’t See

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.