DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Revisiting Multi-Region in the times of conflict

Revisiting Multi-Region in the times of conflict

3
Comments
4 min read
Public IPs Are Not LANs: A Routing Mental Model That Actually Works

Public IPs Are Not LANs: A Routing Mental Model That Actually Works

1
Comments
2 min read
Secrets in the AI Era: Where Plaintext Lives

Secrets in the AI Era: Where Plaintext Lives

Comments
5 min read
Building a Real-World DevSecOps Pipeline (Project Overview)

Building a Real-World DevSecOps Pipeline (Project Overview)

2
Comments 1
1 min read
I built a generic Privacy Shield for ChatGPT (and a Pro mode for Developers) 🛡️

I built a generic Privacy Shield for ChatGPT (and a Pro mode for Developers) 🛡️

1
Comments 1
2 min read
MdBin Levels Up Again: E2E Encryption, Theme Toggle, and Responsive Nav

MdBin Levels Up Again: E2E Encryption, Theme Toggle, and Responsive Nav

8
Comments
8 min read
Role of developers today...

Role of developers today...

Comments
4 min read
Security news weekly round-up - 30th January 2026

Security news weekly round-up - 30th January 2026

Comments
3 min read
We Audited Anthropic's Official MCP Servers — Here's the Compliance Problem No One's Talking About

We Audited Anthropic's Official MCP Servers — Here's the Compliance Problem No One's Talking About

Comments 1
4 min read
How to Audit What Your AI Agents Actually Did — Visual Behavioral Proof with PageBolt

How to Audit What Your AI Agents Actually Did — Visual Behavioral Proof with PageBolt

1
Comments 2
4 min read
The MCP Rug Pull Attack: The Threat That Changes Your Tools After You've Approved Them

The MCP Rug Pull Attack: The Threat That Changes Your Tools After You've Approved Them

Comments 1
12 min read
Exploring AI Infrastructure: Vibe Coding's Promise and Risks

Exploring AI Infrastructure: Vibe Coding's Promise and Risks

Comments
9 min read
Pockr | Part 2 — Executing Binaries on Android

Pockr | Part 2 — Executing Binaries on Android

1
Comments
3 min read
37 Vulnerabilities Exposed Across 15 AI IDEs: The Threat Model Every AI Coding Tool User Must Understand

37 Vulnerabilities Exposed Across 15 AI IDEs: The Threat Model Every AI Coding Tool User Must Understand

1
Comments
7 min read
AWS IAM Explained Without Making Your Head Hurt

AWS IAM Explained Without Making Your Head Hurt

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.