DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page

Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page

Comments
6 min read
Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Comments 1
3 min read
Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters

Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters

Comments
6 min read
Como parei de fazer deploy pra mudar permissão de usuário

Como parei de fazer deploy pra mudar permissão de usuário

1
Comments 1
3 min read
Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Comments
5 min read
How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

1
Comments
5 min read
How to Debug Encrypted API Traffic When Console.log Isn't Enough

How to Debug Encrypted API Traffic When Console.log Isn't Enough

Comments
5 min read
Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Comments
3 min read
3 Auth Bugs Cursor Keeps Writing Into Your API Endpoints

3 Auth Bugs Cursor Keeps Writing Into Your API Endpoints

Comments
3 min read
Docker Security Best Practices for Self-Hosters in 2026

Docker Security Best Practices for Self-Hosters in 2026

Comments
10 min read
I Spent a Week Securing Webhook Ingestion. The Real Attack Surface Was Delivery.

I Spent a Week Securing Webhook Ingestion. The Real Attack Surface Was Delivery.

Comments
6 min read
Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Comments
7 min read
194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

Comments
1 min read
A $10B AI Startup Just Got Breached Through the LLM Library in Your Stack.

A $10B AI Startup Just Got Breached Through the LLM Library in Your Stack.

Comments
8 min read
Your LLM Gateway Is a Blind Spot. Here's How to Instrument It After the LiteLLM Incident.

Your LLM Gateway Is a Blind Spot. Here's How to Instrument It After the LiteLLM Incident.

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.