DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
A Defense in Depth Approach to Cloud Security

A Defense in Depth Approach to Cloud Security

Comments
8 min read
Guess password easy Google beginner's quest CTF 2026 write up

Guess password easy Google beginner's quest CTF 2026 write up

Comments
3 min read
Your AI Agent Has a Supply Chain. Nobody Is Auditing It.

Your AI Agent Has a Supply Chain. Nobody Is Auditing It.

1
Comments
5 min read
JSON Diff: Semantic JSON Comparison — 100% Private, 100% In-Browser

JSON Diff: Semantic JSON Comparison — 100% Private, 100% In-Browser

1
Comments 1
2 min read
A Quiet First Launch: Notes from Wrestling JHelpDesk with macOS Gatekeeper

A Quiet First Launch: Notes from Wrestling JHelpDesk with macOS Gatekeeper

Comments
4 min read
TLS Certificates Are About to Expire Way More Often. Here's How I'm Handling It.

TLS Certificates Are About to Expire Way More Often. Here's How I'm Handling It.

38
Comments 8
3 min read
Why your .env files are a security risk (and what to do instead)

Why your .env files are a security risk (and what to do instead)

2
Comments
3 min read
How ProofVault turned trust from a documentation claim into a reproducible release artifact

How ProofVault turned trust from a documentation claim into a reproducible release artifact

2
Comments 2
5 min read
AI News Roundup: KPI-Pressured Agents, Showboat/Rodney, and Qwen-Image-2.0

AI News Roundup: KPI-Pressured Agents, Showboat/Rodney, and Qwen-Image-2.0

1
Comments
3 min read
The day my MCP adapter stopped being just plumbing

The day my MCP adapter stopped being just plumbing

1
Comments
6 min read
CVE-2025-66630: The Null Identity: Unmasking Fiber's Critical 'Zero-UUID' Vulnerability

CVE-2025-66630: The Null Identity: Unmasking Fiber's Critical 'Zero-UUID' Vulnerability

Comments
2 min read
Stop Shipping Broken Env Config

Stop Shipping Broken Env Config

11
Comments 3
6 min read
ID-JAG Deep Dive

ID-JAG Deep Dive

2
Comments
19 min read
Beyond Encryption: Designing a Tamper-Evident State Engine

Beyond Encryption: Designing a Tamper-Evident State Engine

Comments
3 min read
FOSDEM 26 - a quick summary

FOSDEM 26 - a quick summary

Comments 1
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.