DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Threat Modeling Isn’t Just for Big Apps (And That’s a Problem)

Threat Modeling Isn’t Just for Big Apps (And That’s a Problem)

Comments
2 min read
GPG Isn’t Broken, You’re Just Using It Wrong

GPG Isn’t Broken, You’re Just Using It Wrong

Comments
5 min read
Building a Simple Cloud Security Automation Tool in Rust

Building a Simple Cloud Security Automation Tool in Rust

Comments
2 min read
Top 15 Container Security Best Practices

Top 15 Container Security Best Practices

Comments
3 min read
Title: Don't Fry Your Computer! Date: 2026-01-25 Description: Best practices for running AI agents safely. Author: Timothy C

Title: Don't Fry Your Computer! Date: 2026-01-25 Description: Best practices for running AI agents safely. Author: Timothy C

Comments
5 min read
I Found a Bug That Exposed Private Instagram Posts to Anyone.

I Found a Bug That Exposed Private Instagram Posts to Anyone.

1
Comments
6 min read
Why Autonomous AI Agents Need Proof-of-Transaction (and How to Add It in 5 Lines of Python)

Why Autonomous AI Agents Need Proof-of-Transaction (and How to Add It in 5 Lines of Python)

2
Comments
5 min read
Docker Compose - SFTP: Managing files securely

Docker Compose - SFTP: Managing files securely

1
Comments
4 min read
I Built an AI Agent Monitoring System as a Non-Dev Side Project. Here's Why.

I Built an AI Agent Monitoring System as a Non-Dev Side Project. Here's Why.

4
Comments 3
2 min read
Defensive Programming can be very easy with Symfony HttpClient

Defensive Programming can be very easy with Symfony HttpClient

10
Comments
1 min read
I Built a Security Firewall for AI Agents — Here's Why Every MCP Server Needs One

I Built a Security Firewall for AI Agents — Here's Why Every MCP Server Needs One

3
Comments
4 min read
How to Attack an MCP Server — and Why Your AI Agent Will Comply

How to Attack an MCP Server — and Why Your AI Agent Will Comply

1
Comments 1
5 min read
Your SSH Keys Are Naked and It's Your Fault

Your SSH Keys Are Naked and It's Your Fault

Comments
6 min read
JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

2
Comments
6 min read
Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

4
Comments 1
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.