DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When "Internal" Stops Meaning Safe

When "Internal" Stops Meaning Safe

Comments
8 min read
Why CSA STAR Can't Govern AI Agents (And What Comes Next)

Why CSA STAR Can't Govern AI Agents (And What Comes Next)

2
Comments
2 min read
Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

1
Comments
3 min read
Flutter Security: Why `isMockLocation` Is Dead in 2026 (And How to Fix It)

Flutter Security: Why `isMockLocation` Is Dead in 2026 (And How to Fix It)

1
Comments
3 min read
I built a chat app that stores absolutely nothing about you. No phone. No email. No logs.

I built a chat app that stores absolutely nothing about you. No phone. No email. No logs.

Comments
1 min read
Cache-Control for Private APIs — the bug nobody sees

Cache-Control for Private APIs — the bug nobody sees

Comments
1 min read
Gatekeeper, Silence, and a File Manager That Just Needed Permission

Gatekeeper, Silence, and a File Manager That Just Needed Permission

Comments
3 min read
Designing an Authentication System: OAuth and SSO

Designing an Authentication System: OAuth and SSO

Comments
8 min read
Building Trust in AI Agents: Why Identity Verification is the Missing Layer

Building Trust in AI Agents: Why Identity Verification is the Missing Layer

Comments
2 min read
Solve Headache Backend API Authentication with Proven NPM Packages

Solve Headache Backend API Authentication with Proven NPM Packages

Comments
2 min read
CVE-2023-43633: Trusted Boot, Untrusted Config: Breaking EVE OS Encryption (CVE-2023-43633)

CVE-2023-43633: Trusted Boot, Untrusted Config: Breaking EVE OS Encryption (CVE-2023-43633)

Comments
2 min read
Solana Lending Protocol Security: A Deep Dive into Audit Best Practices

Solana Lending Protocol Security: A Deep Dive into Audit Best Practices

1
Comments
8 min read
🔐Current Passkeys Are a Single Point of Failure

🔐Current Passkeys Are a Single Point of Failure

Comments
3 min read
How I Found $300,000 Worth of Secrets in a Download Button

How I Found $300,000 Worth of Secrets in a Download Button

Comments
5 min read
Studying the Great Firewall's obfuscation and detection techniques (GFW)

Studying the Great Firewall's obfuscation and detection techniques (GFW)

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.