DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
OAuth 2.0 Refresh Token Vulnerabilities: Why Your App is Exposing User Accounts

OAuth 2.0 Refresh Token Vulnerabilities: Why Your App is Exposing User Accounts

2
Comments
10 min read
FAQ: GitHub Secrets Leaks — What Every Developer Needs to Know

FAQ: GitHub Secrets Leaks — What Every Developer Needs to Know

Comments
6 min read
The End of kubernetes/ingress-nginx: Your March 2026 Migration Playbook

The End of kubernetes/ingress-nginx: Your March 2026 Migration Playbook

Comments
6 min read
What LLM Guardrails Don't Cover (And What AI Governance Actually Requires)

What LLM Guardrails Don't Cover (And What AI Governance Actually Requires)

1
Comments
8 min read
Stop Sending Your Code to Random Servers — Use Client-Side Dev Tools Instead

Stop Sending Your Code to Random Servers — Use Client-Side Dev Tools Instead

Comments
3 min read
The Supply Chain Attack That's Already In Your Codebase

The Supply Chain Attack That's Already In Your Codebase

Comments
6 min read
Your API Rate-Limit Is Useless Against Distributed Attacks

Your API Rate-Limit Is Useless Against Distributed Attacks

Comments
8 min read
The 73% Problem: Why Enterprise Prompt Injection Fixes Don't Work (And What Actually Does)

The 73% Problem: Why Enterprise Prompt Injection Fixes Don't Work (And What Actually Does)

Comments
6 min read
Misconfigured AI Agents Leak Data by Default — Your 4-Week Audit Playbook

Misconfigured AI Agents Leak Data by Default — Your 4-Week Audit Playbook

Comments
5 min read
pagevault: Hiding an Encryption Platform Inside HTML

pagevault: Hiding an Encryption Platform Inside HTML

1
Comments
4 min read
FAQ: Agentic AI Security Threats — Your Top Questions Answered

FAQ: Agentic AI Security Threats — Your Top Questions Answered

Comments
4 min read
Stop babysitting your AI agent!

Stop babysitting your AI agent!

29
Comments 8
3 min read
Beyond Artifact-Only Evaluation: A Case for Development-Session Attestation (DSA)

Beyond Artifact-Only Evaluation: A Case for Development-Session Attestation (DSA)

Comments
5 min read
How to Detect Compromised Dependencies in Your CI/CD Pipeline Before They Deploy to Production

How to Detect Compromised Dependencies in Your CI/CD Pipeline Before They Deploy to Production

1
Comments
6 min read
Automated Secret Rotation: How to Prevent Credential Sprawl Without Breaking CI/CD

Automated Secret Rotation: How to Prevent Credential Sprawl Without Breaking CI/CD

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.