DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Web Applications Fail: An OWASP Top 10 Analysis Using Laravel and WordPress

How Web Applications Fail: An OWASP Top 10 Analysis Using Laravel and WordPress

Comments
3 min read
A Spammer Gave Me the Perfect Test Suite for My Content Classifier

A Spammer Gave Me the Perfect Test Suite for My Content Classifier

3
Comments
3 min read
RoguePilot: How a Simple GitHub Issue Can Steal Your Copilot Session

RoguePilot: How a Simple GitHub Issue Can Steal Your Copilot Session

1
Comments
8 min read
Building a Faster secp256k1 Library – UltrafastSecp256k1 v3.21

Building a Faster secp256k1 Library – UltrafastSecp256k1 v3.21

2
Comments
1 min read
My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

Comments 2
5 min read
Running AI Agents Safely with Firecracker MicroVMs (Introducing BunkerVM)

Running AI Agents Safely with Firecracker MicroVMs (Introducing BunkerVM)

3
Comments
2 min read
Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Comments
3 min read
MIME Sniffing — the API issue nobody notices until it bites

MIME Sniffing — the API issue nobody notices until it bites

1
Comments
1 min read
The DeFi Security Playbook: What Top Protocols Do Differently in 2026

The DeFi Security Playbook: What Top Protocols Do Differently in 2026

Comments
5 min read
The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

4
Comments
3 min read
TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

Comments 1
3 min read
🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

1
Comments
3 min read
Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Comments
10 min read
Security news weekly round-up - 6th February 2026

Security news weekly round-up - 6th February 2026

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.