DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

2
Comments
2 min read
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 āļ—āļģāļ„āļ§āļēāļĄāđ€āļ‚āđ‰āļēāđƒāļˆ Row-Level Security (RLS) āđƒāļ™ PostgreSQL āđāļšāļšāļ‡āđˆāļēāļĒāļ—āļĩāđˆāļŠāļļāļ”

🚀 āļ—āļģāļ„āļ§āļēāļĄāđ€āļ‚āđ‰āļēāđƒāļˆ Row-Level Security (RLS) āđƒāļ™ PostgreSQL āđāļšāļšāļ‡āđˆāļēāļĒāļ—āļĩāđˆāļŠāļļāļ”

Comments
1 min read
BetterAuth Integration with Encore.ts

BetterAuth Integration with Encore.ts

13
Comments
14 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
What is a Prompt Injection Attack

What is a Prompt Injection Attack

1
Comments
2 min read
Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
OWASP Cornucopia 3.0 - A call for card game designers!

OWASP Cornucopia 3.0 - A call for card game designers!

1
Comments
2 min read
The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

Comments
4 min read
Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

1
Comments
6 min read
Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

2
Comments 1
6 min read
Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Comments
7 min read
The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

Comments
5 min read
Testing HMAC Signatures Online — A Free Developer Tool

Testing HMAC Signatures Online — A Free Developer Tool

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.