DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Solana Vulnerabilities Every Developer Should Know

Solana Vulnerabilities Every Developer Should Know

Comments
20 min read
The Dead Man’s Switch Paradox: Coding Trustless Inheritance in Python

The Dead Man’s Switch Paradox: Coding Trustless Inheritance in Python

5
Comments
3 min read
SSH Like a Pro: Creating an Isolated User on an EC2 Instance (Without Breaking Anything)

SSH Like a Pro: Creating an Isolated User on an EC2 Instance (Without Breaking Anything)

Comments
3 min read
The DevOps vs. Forensics Mindset: Tracing Unauthorized kubectl Access on EKS

The DevOps vs. Forensics Mindset: Tracing Unauthorized kubectl Access on EKS

Comments
4 min read
Why macOS Refused to Run WIT — and What Finally Fixed I

Why macOS Refused to Run WIT — and What Finally Fixed I

Comments
4 min read
Field Report: When macOS Gatekeeper Quietly Refused to Launch Elevate (and How I Finally Got It Running)

Field Report: When macOS Gatekeeper Quietly Refused to Launch Elevate (and How I Finally Got It Running)

Comments
4 min read
Serving SSE-KMS Encrypted Content from S3 Using CloudFront

Serving SSE-KMS Encrypted Content from S3 Using CloudFront

Comments
7 min read
CGNAT Escape Plan: Private Access + Browser-Trusted TLS for My Self-Hosted Stack

CGNAT Escape Plan: Private Access + Browser-Trusted TLS for My Self-Hosted Stack

Comments
4 min read
Zero Trust for AI Agents: Why I Built a "Handshake Protocol" (IATP)

Zero Trust for AI Agents: Why I Built a "Handshake Protocol" (IATP)

Comments
3 min read
I built a Serverless OpenAI Gateway to cut costs by 30% and sanitize PII (Open Source)

I built a Serverless OpenAI Gateway to cut costs by 30% and sanitize PII (Open Source)

Comments
3 min read
Malicious Redirection via _posts Table Injection

Malicious Redirection via _posts Table Injection

Comments
1 min read
SavvyWolf Web Shell - Manager Variant

SavvyWolf Web Shell - Manager Variant

Comments
2 min read
Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Comments
3 min read
Secrets in the AI Era: Where Plaintext Lives

Secrets in the AI Era: Where Plaintext Lives

Comments
5 min read
Public IPs Are Not LANs: A Routing Mental Model That Actually Works

Public IPs Are Not LANs: A Routing Mental Model That Actually Works

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.