DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unlock Local Encryption with Passkeys: A Guide to the KEK (PRF) Feature

Unlock Local Encryption with Passkeys: A Guide to the KEK (PRF) Feature

Comments
4 min read
A2A Contagion: Securing the Agent-to-Agent Communication Mesh

A2A Contagion: Securing the Agent-to-Agent Communication Mesh

Comments
11 min read
Your AI Coding Assistant is Probably Writing Vulnerabilities. Here's How to Catch Them.

Your AI Coding Assistant is Probably Writing Vulnerabilities. Here's How to Catch Them.

6
Comments
8 min read
Protect Children, Preserve Privacy, Internet Freedom: Pick Two

Protect Children, Preserve Privacy, Internet Freedom: Pick Two

1
Comments
7 min read
Budget Friendly ISO27001/SOC2 Compliant Environments for AWS

Budget Friendly ISO27001/SOC2 Compliant Environments for AWS

2
Comments
21 min read
A Lightweight Linux Firewall with Integrated Auto-Ban (nftables-primary backend)

A Lightweight Linux Firewall with Integrated Auto-Ban (nftables-primary backend)

1
Comments
3 min read
AI Agents Need Governance. Here's What We Built

AI Agents Need Governance. Here's What We Built

Comments
3 min read
Why Passkeys Aren't Ready for Encrypting Your User Data (Yet)

Why Passkeys Aren't Ready for Encrypting Your User Data (Yet)

Comments
1 min read
Why Your Audio Tool Shouldn't Be Uploading Your Files to a Server

Why Your Audio Tool Shouldn't Be Uploading Your Files to a Server

1
Comments
2 min read
386 Malicious Skills: How ClawMoat's Skill Audit Would Have Caught Them

386 Malicious Skills: How ClawMoat's Skill Audit Would Have Caught Them

Comments
5 min read
Supermicro's Co-Founder Used a Hair Dryer to Pull Off a $2.5 Billion GPU Heist

Supermicro's Co-Founder Used a Hair Dryer to Pull Off a $2.5 Billion GPU Heist

1
Comments
2 min read
Visualizing Agent Trust: How We Built an Interactive Trust Graph

Visualizing Agent Trust: How We Built an Interactive Trust Graph

Comments
2 min read
You Trust Your Crypto to 24 Words. Why Not Your Passwords?

You Trust Your Crypto to 24 Words. Why Not Your Passwords?

2
Comments 1
6 min read
GHSA-GQ83-8Q7Q-9HFX: GHSA-GQ83-8Q7Q-9HFX: Race Condition in OpenClaw Sandbox Registry Leads to Data Corruption

GHSA-GQ83-8Q7Q-9HFX: GHSA-GQ83-8Q7Q-9HFX: Race Condition in OpenClaw Sandbox Registry Leads to Data Corruption

1
Comments
2 min read
WireGuard vs OpenVPN in 2026: Which VPN Protocol Should Developers Care About?

WireGuard vs OpenVPN in 2026: Which VPN Protocol Should Developers Care About?

1
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.