DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Microsoft Entra Agent ID

Understanding Microsoft Entra Agent ID

3
Comments 3
6 min read
WAF Checker — Guess what? Someone is actually using it!

WAF Checker — Guess what? Someone is actually using it!

Comments
1 min read
Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Comments
8 min read
What Your IP Address Actually Reveals (A Developer's Perspective)

What Your IP Address Actually Reveals (A Developer's Perspective)

2
Comments
5 min read
When System Boundaries Meet State Pressure: Lessons from the Anthropic–US Government Standoff

When System Boundaries Meet State Pressure: Lessons from the Anthropic–US Government Standoff

6
Comments 2
4 min read
Hybrid Local Memory in OpenClaw (SetupClaw Basic Setup): BM25 + Vectors + sqlite-vec + Local Embeddings

Hybrid Local Memory in OpenClaw (SetupClaw Basic Setup): BM25 + Vectors + sqlite-vec + Local Embeddings

Comments
3 min read
When TLS 1.3 Silently Dies Inside Your Android Proxy

When TLS 1.3 Silently Dies Inside Your Android Proxy

1
Comments
6 min read
Security Theater vs Structural Protection

Security Theater vs Structural Protection

Comments
3 min read
How to Prevent Common Security Vulnerabilities in REST APIs

How to Prevent Common Security Vulnerabilities in REST APIs

2
Comments
12 min read
Intentional Exercise Hacker 101 CTF writeup

Intentional Exercise Hacker 101 CTF writeup

Comments
8 min read
How OpenAI and Persona Built an Identity Surveillance Machine for the US Government

How OpenAI and Persona Built an Identity Surveillance Machine for the US Government

4
Comments 1
7 min read
I Scanned 100 Vibe-Coded Apps for Security. I Found 318 Vulnerabilities.

I Scanned 100 Vibe-Coded Apps for Security. I Found 318 Vulnerabilities.

2
Comments
3 min read
Why Your AI Agent Needs a Kill Switch That Actually Works

Why Your AI Agent Needs a Kill Switch That Actually Works

1
Comments 2
4 min read
How to Audit Production Code: A 5-Layer Bug Hunting Methodology

How to Audit Production Code: A 5-Layer Bug Hunting Methodology

9
Comments
5 min read
Built runtime security for AI agents

Built runtime security for AI agents

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.