DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Drift Detection in Air-Gapped Workloads: What Nobody Tells You

Drift Detection in Air-Gapped Workloads: What Nobody Tells You

Comments
6 min read
Security Declaration for AI Agents: Deep Dive into A2AS (Agent-to-Agent Security) Certification Mechanism

Security Declaration for AI Agents: Deep Dive into A2AS (Agent-to-Agent Security) Certification Mechanism

Comments 1
4 min read
Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

3
Comments
2 min read
SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

Comments
2 min read
GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

Comments
2 min read
AgentGate vs. Building Your Own AI Agent Security Layer: An Honest Comparison

AgentGate vs. Building Your Own AI Agent Security Layer: An Honest Comparison

Comments
6 min read
18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.

18,883 MCP servers. Five Chinese tech giants joined this week. Zero security audits.

7
Comments
3 min read
Dry-Run Engineering: The Simple Practice That Prevents Production Disasters

Dry-Run Engineering: The Simple Practice That Prevents Production Disasters

Comments
4 min read
Stop AI Agents from Leaking PII

Stop AI Agents from Leaking PII

3
Comments 5
1 min read
How I Built Real-Time PII Detection Inside ChatGPT's Hostile Text Editor (Without Breaking It)

How I Built Real-Time PII Detection Inside ChatGPT's Hostile Text Editor (Without Breaking It)

2
Comments
6 min read
Kyverno for Kubernetes Policies

Kyverno for Kubernetes Policies

1
Comments
7 min read
5 Critical Security Layers Every Crypto Exchange Software Must Have (With Code Examples)

5 Critical Security Layers Every Crypto Exchange Software Must Have (With Code Examples)

Comments
5 min read
I Found a SQL Injection in an AI Agent. It Taught Me That We Broke the First Rule of Database Security.

I Found a SQL Injection in an AI Agent. It Taught Me That We Broke the First Rule of Database Security.

1
Comments
9 min read
OpenSSL Engine API Explained: Connecting Google Cloud KMS, YubiKey, and More

OpenSSL Engine API Explained: Connecting Google Cloud KMS, YubiKey, and More

Comments
2 min read
Permissions & Ownership: Preventing Unauthorized Access in FastAPI

Permissions & Ownership: Preventing Unauthorized Access in FastAPI

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.