DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Audited a Claude Code Plugin That Reads All Your Browser Cookies

I Audited a Claude Code Plugin That Reads All Your Browser Cookies

Comments
2 min read
The Aave CAPO Oracle Meltdown: How a 2.85% Price Error Triggered $27M in Liquidations

The Aave CAPO Oracle Meltdown: How a 2.85% Price Error Triggered $27M in Liquidations

Comments
6 min read
The Four Layers of Hook Perception: Why Your AI Guardrails Aren't Actually Working

The Four Layers of Hook Perception: Why Your AI Guardrails Aren't Actually Working

Comments
9 min read
The $1,808 Governance Heist: How an Attacker Nearly Drained $1M From Moonwell

The $1,808 Governance Heist: How an Attacker Nearly Drained $1M From Moonwell

Comments
6 min read
The Architectural Problem With Compliance-as-a-Service

The Architectural Problem With Compliance-as-a-Service

Comments
3 min read
Stop Hardcoding Permissions: Architecting Enterprise RBAC in Laravel

Stop Hardcoding Permissions: Architecting Enterprise RBAC in Laravel

Comments
2 min read
The Q1 2026 DeFi Exploit Autopsy: $137M Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One

The Q1 2026 DeFi Exploit Autopsy: $137M Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One

1
Comments
7 min read
GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

GHSA-PRH4-VHFH-24MJ: GHSA-PRH4-VHFH-24MJ: Information Exposure in Harbor Configuration Audit Logs

1
Comments
2 min read
We kept thinking SentinelGate was ready. It wasn't.

We kept thinking SentinelGate was ready. It wasn't.

Comments
6 min read
The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

1
Comments
4 min read
What Delve Got Wrong: Why Compliance Evidence Needs to Be Cryptographically Provable

What Delve Got Wrong: Why Compliance Evidence Needs to Be Cryptographically Provable

Comments
3 min read
Agent Systems Are Failing at Trust Boundaries. We Ran 332 Tests to Prove It.

Agent Systems Are Failing at Trust Boundaries. We Ran 332 Tests to Prove It.

1
Comments
6 min read
MCP Security Report — March 2026: 30 CVEs, 437K Compromised Downloads

MCP Security Report — March 2026: 30 CVEs, 437K Compromised Downloads

1
Comments
2 min read
Why Data Governance Is Not Optional in a Microsoft Fabric Workflow

Why Data Governance Is Not Optional in a Microsoft Fabric Workflow

1
Comments
6 min read
The Security Gap in MCP Tool Servers (And What I Built to Fix It)

The Security Gap in MCP Tool Servers (And What I Built to Fix It)

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.