DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

Comments
1 min read
GitHub Copilot Security Review: It Executes Malware With Zero Approval

GitHub Copilot Security Review: It Executes Malware With Zero Approval

14
Comments 6
4 min read
From Cloud Engineer to Architect: Building the Right Skill Stack

From Cloud Engineer to Architect: Building the Right Skill Stack

2
Comments 1
7 min read
We got tired of users asking "is this file legit?" so we built a verification system

We got tired of users asking "is this file legit?" so we built a verification system

Comments
2 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Comments
2 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Comments
9 min read
30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About

30 CVEs and Counting: The MCP Security Crisis Nobody's Talking About

Comments 1
6 min read
Modular Isolation Architecture (MIA)

Modular Isolation Architecture (MIA)

Comments
2 min read
I built what browsers refused to ship: SRI for fetch()

I built what browsers refused to ship: SRI for fetch()

Comments
2 min read
The OWASP Top 10 for AI Agents: What Each Risk Means and How to Detect It

The OWASP Top 10 for AI Agents: What Each Risk Means and How to Detect It

1
Comments
8 min read
The Difference Between an AI Agent That Consumes Secrets and One That Operates Them

The Difference Between an AI Agent That Consumes Secrets and One That Operates Them

6
Comments 2
7 min read
What mcpwall Does and Doesn't Protect Against

What mcpwall Does and Doesn't Protect Against

Comments
3 min read
What Exactly is "Authentication": From the Limits of Passwords to FIDO2, Passkeys, and IdP Architecture

What Exactly is "Authentication": From the Limits of Passwords to FIDO2, Passkeys, and IdP Architecture

1
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.