DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Built an Autonomous Cloud Engineer That Actually Fixes Your Infrastructure

I Built an Autonomous Cloud Engineer That Actually Fixes Your Infrastructure

2
Comments
7 min read
Your AI Content Tool Knows Your Strategy. Do You Know Where It Goes?

Your AI Content Tool Knows Your Strategy. Do You Know Where It Goes?

Comments
4 min read
Google API Keys Exposed: Gemini's Unauthorized Usage Causes Billing Issues, Google Responds After Initial Denial

Google API Keys Exposed: Gemini's Unauthorized Usage Causes Billing Issues, Google Responds After Initial Denial

Comments
8 min read
We Scanned 231 OpenClaw Skills for Security Vulnerabilities — Here's What We Found

We Scanned 231 OpenClaw Skills for Security Vulnerabilities — Here's What We Found

Comments
6 min read
Webhook Security in Next.js: Signatures, Idempotency, and Avoiding Common Mistakes

Webhook Security in Next.js: Signatures, Idempotency, and Avoiding Common Mistakes

1
Comments
5 min read
Next.js Environment Variables: The Complete Guide to Avoiding Common Mistakes

Next.js Environment Variables: The Complete Guide to Avoiding Common Mistakes

Comments 1
4 min read
Review: Firefox Hardening Baselines from Red-Team Tradecraft for Drupal/WordPress Admin and AI Coding Workflows

Review: Firefox Hardening Baselines from Red-Team Tradecraft for Drupal/WordPress Admin and AI Coding Workflows

1
Comments
4 min read
Codex Security: now in research preview

Codex Security: now in research preview

1
Comments
1 min read
I built an AI agent that watches your GitHub repo and opens PRs when it finds bugs — automatically

I built an AI agent that watches your GitHub repo and opens PRs when it finds bugs — automatically

1
Comments
2 min read
Detecting Rooted & Jailbroken Devices in React Native — How I Built It and What I Learned

Detecting Rooted & Jailbroken Devices in React Native — How I Built It and What I Learned

1
Comments
4 min read
The MCP Supply Chain Problem: What Happens When You Install a Malicious Server

The MCP Supply Chain Problem: What Happens When You Install a Malicious Server

1
Comments 1
5 min read
MCP Server Security Checklist: 23 Things to Audit Before You Install

MCP Server Security Checklist: 23 Things to Audit Before You Install

Comments 1
5 min read
How I Replaced LLM-Based Code Analysis with Static Analysis (And Got Better Results)

How I Replaced LLM-Based Code Analysis with Static Analysis (And Got Better Results)

Comments
5 min read
Middleware vs Sidecar: two ways to govern AI agents

Middleware vs Sidecar: two ways to govern AI agents

1
Comments 2
5 min read
OAuth2 Security Best Practices: 6 Vulnerabilities That Get Apps Breached

OAuth2 Security Best Practices: 6 Vulnerabilities That Get Apps Breached

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.