DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Claude Code plugin credentials: what the new keychain storage does and doesn't do

Claude Code plugin credentials: what the new keychain storage does and doesn't do

Comments
5 min read
The Trivy Attack: Why SHA Pinning Fails GitHub Actions

The Trivy Attack: Why SHA Pinning Fails GitHub Actions

Comments
4 min read
AI-Native IDS: Why Edge Security Needs Machine Learning

AI-Native IDS: Why Edge Security Needs Machine Learning

Comments 1
1 min read
CAP Security & Authorization — XSUAA, @restrict & Multi-Tenant Auth

CAP Security & Authorization — XSUAA, @restrict & Multi-Tenant Auth

Comments
5 min read
We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.

We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.

Comments
8 min read
The TeamPCP Supply Chain Campaign: How Compromised Security Tools Are Draining Crypto Wallets — A DeFi Developer's Defense Playbook

The TeamPCP Supply Chain Campaign: How Compromised Security Tools Are Draining Crypto Wallets — A DeFi Developer's Defense Playbook

Comments
8 min read
API Security Testing Automation: Building Comprehensive Testing Pipelines That Actually Catch Vulnerabilities

API Security Testing Automation: Building Comprehensive Testing Pipelines That Actually Catch Vulnerabilities

Comments
20 min read
Don't Lose Your IP Through Your MCP

Don't Lose Your IP Through Your MCP

Comments
12 min read
Why I stopped using CAPTCHAs and built a behavioral API instead

Why I stopped using CAPTCHAs and built a behavioral API instead

3
Comments
2 min read
sandbox individual npm dependencies in your node app

sandbox individual npm dependencies in your node app

Comments
2 min read
Stop deploying your AI agents raw. (A quick security PSA)

Stop deploying your AI agents raw. (A quick security PSA)

Comments 1
1 min read
🗝️ Public/Private Keys Explained Like You're 5

🗝️ Public/Private Keys Explained Like You're 5

1
Comments 1
1 min read
The Line Between Research and Surveillance Is Gone

The Line Between Research and Surveillance Is Gone

2
Comments
6 min read
EtherRAT: How North Korean Hackers Weaponized Ethereum Smart Contracts Into an Unkillable Command Server That Steals Your Crypto

EtherRAT: How North Korean Hackers Weaponized Ethereum Smart Contracts Into an Unkillable Command Server That Steals Your Crypto

Comments
5 min read
Approaches to code reviews

Approaches to code reviews

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.