DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What Is a "Cyber Ninja"? — The World of Full-Stack Hacking

What Is a "Cyber Ninja"? — The World of Full-Stack Hacking

1
Comments
4 min read
Your AI Agent Has No Identity. Here's a One-Liner Fix.

Your AI Agent Has No Identity. Here's a One-Liner Fix.

Comments
3 min read
How Phishing Websites Trick Users and How to Detect Them

How Phishing Websites Trick Users and How to Detect Them

Comments
6 min read
Environment is context: security auditing for AI agent workstations

Environment is context: security auditing for AI agent workstations

Comments
4 min read
Tracking, Propagation Attacks, and What We Found in Real Email Traffic

Tracking, Propagation Attacks, and What We Found in Real Email Traffic

14
Comments
7 min read
Claude Code Auto Mode: Never Let It Touch Production Without Reading This

Claude Code Auto Mode: Never Let It Touch Production Without Reading This

Comments
4 min read
I Built a JWT Decoder and Lost Half a Day to atob()

I Built a JWT Decoder and Lost Half a Day to atob()

Comments
4 min read
3,000 Downloads, 14 Users: What I Learned About the Cold-Start Problem in Agent Identity

3,000 Downloads, 14 Users: What I Learned About the Cold-Start Problem in Agent Identity

1
Comments
3 min read
Spam, Breaches, Verification: Why Your Real Number Shouldn’t Be Public

Spam, Breaches, Verification: Why Your Real Number Shouldn’t Be Public

1
Comments
2 min read
We Built a Live Trust Observatory for Our AI Agent Network

We Built a Live Trust Observatory for Our AI Agent Network

1
Comments
2 min read
Claude Code Has Been Reading Your Database Password This Whole Time

Claude Code Has Been Reading Your Database Password This Whole Time

Comments
3 min read
5 MCP Servers for Agent Identity — And Why the Problem Is Harder Than Any of Them Solve

5 MCP Servers for Agent Identity — And Why the Problem Is Harder Than Any of Them Solve

1
Comments
2 min read
How I Built a Secure Reverse Proxy with Nginx

How I Built a Secure Reverse Proxy with Nginx

Comments
3 min read
The 5 Security Holes in Almost Every MCP Server (And How to Find Them)

The 5 Security Holes in Almost Every MCP Server (And How to Find Them)

Comments
3 min read
Your AI agent sandbox has no gate

Your AI agent sandbox has no gate

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.