DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
FB2Combiner

FB2Combiner

1
Comments
4 min read
Passkeys Are Ready. Here Is How to Add Them to Your App

Passkeys Are Ready. Here Is How to Add Them to Your App

Comments
6 min read
Your AI Agent Passed OAuth. Now What? The Authorization Gap Nobody Talks About

Your AI Agent Passed OAuth. Now What? The Authorization Gap Nobody Talks About

1
Comments 3
6 min read
Clawdbot Leaked 1.5 Million API Keys. Here Is What I Built to Stop It Happening to You.

Clawdbot Leaked 1.5 Million API Keys. Here Is What I Built to Stop It Happening to You.

Comments
3 min read
GHSA-XX7M-69FF-9CRP: SurrealDB's Poison Pill: Crashing the Database with a Single String

GHSA-XX7M-69FF-9CRP: SurrealDB's Poison Pill: Crashing the Database with a Single String

Comments
2 min read
What Is Runtime Authorization? A Guide to Dynamic Access Control and the Best Runtime Authorization Tools

What Is Runtime Authorization? A Guide to Dynamic Access Control and the Best Runtime Authorization Tools

5
Comments
5 min read
Tokens Can Be Copied. Sockets Cannot. This Changes Everything.

Tokens Can Be Copied. Sockets Cannot. This Changes Everything.

33
Comments 11
10 min read
Secure PIN Processing: A Deep Dive into ISO 9564-1 PIN Blocks, RSA, and AES Encryption

Secure PIN Processing: A Deep Dive into ISO 9564-1 PIN Blocks, RSA, and AES Encryption

Comments
7 min read
AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed

AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed

2
Comments
13 min read
The ZK Proof Verification Minefield: Frozen Heart, Input Aliasing, and Proof Malleability

The ZK Proof Verification Minefield: Frozen Heart, Input Aliasing, and Proof Malleability

Comments 2
6 min read
Understanding JWT Authentication in Java with Encryption and Decryption

Understanding JWT Authentication in Java with Encryption and Decryption

6
Comments
4 min read
How I Built a PII Scrubber to Protect Against OpenClaw Breaches

How I Built a PII Scrubber to Protect Against OpenClaw Breaches

Comments
5 min read
Your AI Agent Forgets Everything. Here's How to Give It a Brain That Actually Thinks.

Your AI Agent Forgets Everything. Here's How to Give It a Brain That Actually Thinks.

Comments
3 min read
A Matter of Authentication

A Matter of Authentication

Comments
2 min read
5 Authentication Patterns Every Web Developer Should Know in 2026

5 Authentication Patterns Every Web Developer Should Know in 2026

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.