DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Designing an E2E-Encrypted Terminal Chat in C++17: SRP-6a, HKDF, and a Relay-Blind Server

Designing an E2E-Encrypted Terminal Chat in C++17: SRP-6a, HKDF, and a Relay-Blind Server

Comments
6 min read
paker: load encrypted Python packages from memory

paker: load encrypted Python packages from memory

Comments
2 min read
Proposal on Play Store security measures (alternative to Google's mandatory "developer verification")

Proposal on Play Store security measures (alternative to Google's mandatory "developer verification")

Comments 2
6 min read
Static Analysis for LLM Prompt Security: A Methodology for Pre-Deploy Vulnerability Detection.

Static Analysis for LLM Prompt Security: A Methodology for Pre-Deploy Vulnerability Detection.

Comments 1
11 min read
Protecting DeFi: Building an AI Sentinel for Rhea Finance Invariant Monitoring

Protecting DeFi: Building an AI Sentinel for Rhea Finance Invariant Monitoring

Comments
2 min read
When prompts become shells: the tool registry is the attack surface

When prompts become shells: the tool registry is the attack surface

1
Comments 2
4 min read
Mulher Amparada

Mulher Amparada

Comments
1 min read
Building a Production-Ready SOC Triage Tool with Python & Streamlit

Building a Production-Ready SOC Triage Tool with Python & Streamlit

Comments
1 min read
AI Weekly: Free Web Tools, MCP Production Wins, Trusted-Compute Models (April 30–May 6, 2026)

AI Weekly: Free Web Tools, MCP Production Wins, Trusted-Compute Models (April 30–May 6, 2026)

2
Comments
5 min read
GitHub App installation tokens are getting longer in May 2026 — your VARCHAR(40) column is about to silently truncate them

GitHub App installation tokens are getting longer in May 2026 — your VARCHAR(40) column is about to silently truncate them

Comments
7 min read
Scaling Full-Stack Applications in High-Compliance Environments

Scaling Full-Stack Applications in High-Compliance Environments

Comments
10 min read
Anthropic Just Killed the API Key: A Deep Dive into Workload Identity Federation for Claude

Anthropic Just Killed the API Key: A Deep Dive into Workload Identity Federation for Claude

Comments
11 min read
5 things healthcare engineering teams get wrong about HIPAA CI/CD

5 things healthcare engineering teams get wrong about HIPAA CI/CD

Comments 1
7 min read
How Crypto On-Ramps Work: The Custody Architecture Behind the 'Buy Crypto' Button

How Crypto On-Ramps Work: The Custody Architecture Behind the 'Buy Crypto' Button

Comments
12 min read
Why We Started Looking for a Bytebase Alternative

Why We Started Looking for a Bytebase Alternative

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.