DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

1
Comments
2 min read
From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack

From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack

2
Comments
6 min read
How to Make Your OpenClaw Agent Call Any API Without Exposing Your Keys

How to Make Your OpenClaw Agent Call Any API Without Exposing Your Keys

6
Comments
5 min read
From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive

From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive

2
Comments
12 min read
CVE-2026-24132: CVE-2026-24132: Orval's Mock Generator Did What You Told It To (And That's The Problem)

CVE-2026-24132: CVE-2026-24132: Orval's Mock Generator Did What You Told It To (And That's The Problem)

Comments
2 min read
HTTPS Isn’t Optional, It’s the Boundary of Your System

HTTPS Isn’t Optional, It’s the Boundary of Your System

Comments
2 min read
How to Secure Your CI/CD Pipeline End-to-End (With Real Tools)

How to Secure Your CI/CD Pipeline End-to-End (With Real Tools)

1
Comments 1
3 min read
Field Guide v0.1 What is inside and where to start

Field Guide v0.1 What is inside and where to start

Comments
2 min read
The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

3
Comments 1
13 min read
⚙️ Persistent Threat Via Environment Vars

⚙️ Persistent Threat Via Environment Vars

Comments
6 min read
We Ran a Verifiable Agent-to-Agent Payment. Here's Exactly How.

We Ran a Verifiable Agent-to-Agent Payment. Here's Exactly How.

4
Comments
4 min read
Webhook Security Best Practices for Production 2025-2026

Webhook Security Best Practices for Production 2025-2026

1
Comments
7 min read
Why We Keep Blaming Prompts Instead of Architecture

Why We Keep Blaming Prompts Instead of Architecture

1
Comments 1
3 min read
Week 7 Scripting Challenge: JWT Token Validation

Week 7 Scripting Challenge: JWT Token Validation

3
Comments
21 min read
CVE-2025-22234: The 73rd Byte: How a Spring Security Fix Created a Timing Leak

CVE-2025-22234: The 73rd Byte: How a Spring Security Fix Created a Timing Leak

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.