DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
81% of Top AI Repos Have No Security CI — We Checked 500

81% of Top AI Repos Have No Security CI — We Checked 500

Comments
2 min read
We Scanned the 100 Most Popular AI Tools for Vulnerabilities

We Scanned the 100 Most Popular AI Tools for Vulnerabilities

Comments
1 min read
How Authensor Covers All 10 OWASP Agentic Risks

How Authensor Covers All 10 OWASP Agentic Risks

1
Comments
9 min read
Infrastructure as a Security Frontier: Winning a 150 XTZ Bounty in the Tezos Ecosystem

Infrastructure as a Security Frontier: Winning a 150 XTZ Bounty in the Tezos Ecosystem

Comments
2 min read
Do You Know Where Your JWT Goes When You Paste It Into an Online Tool?

Do You Know Where Your JWT Goes When You Paste It Into an Online Tool?

Comments
5 min read
The soul file

The soul file

Comments 1
3 min read
AI Data Residency Requirements by Region: The Complete Enterprise Compliance Guide

AI Data Residency Requirements by Region: The Complete Enterprise Compliance Guide

Comments
11 min read
I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.

I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.

Comments
6 min read
Backend Security Fundamentals (Modern Guide for Engineers)

Backend Security Fundamentals (Modern Guide for Engineers)

1
Comments 1
5 min read
Security patterns for agent memory

Security patterns for agent memory

Comments
5 min read
Before You Deploy AI-Generated Code: A Production Checklist

Before You Deploy AI-Generated Code: A Production Checklist

Comments
3 min read
Understanding Debt: The Security Time Bomb in Your AI-Generated Code

Understanding Debt: The Security Time Bomb in Your AI-Generated Code

Comments
5 min read
How an Unrestricted Firebase API Key Can Drain Your Bank Account Overnight

How an Unrestricted Firebase API Key Can Drain Your Bank Account Overnight

1
Comments
5 min read
I Was Targeted by a DPRK-Linked Supply Chain Attack via LinkedIn. Here's Exactly How It Worked.

I Was Targeted by a DPRK-Linked Supply Chain Attack via LinkedIn. Here's Exactly How It Worked.

8
Comments 1
5 min read
Configure Network Routing

Configure Network Routing

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.