DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Security Gap in MCP Tool Servers (And What I Built to Fix It)

The Security Gap in MCP Tool Servers (And What I Built to Fix It)

Comments
6 min read
AI Hallucination Squatting: The New Agentic Attack Vector

AI Hallucination Squatting: The New Agentic Attack Vector

Comments
12 min read
What If Your AI Ran Inside an OS Designed for It?

What If Your AI Ran Inside an OS Designed for It?

Comments
3 min read
Event-Driven Threat Detection: Building Real-Time Security on Conditional Access Gaps

Event-Driven Threat Detection: Building Real-Time Security on Conditional Access Gaps

1
Comments
8 min read
Rotifer v0.8: Iron Shell — Hardening Before Scaling

Rotifer v0.8: Iron Shell — Hardening Before Scaling

1
Comments
3 min read
AIGoat - AI Security Playground to Attack and Defend LLMs. All Running Locally

AIGoat - AI Security Playground to Attack and Defend LLMs. All Running Locally

2
Comments 1
3 min read
The Resolv USR Stablecoin Exploit: How a Compromised Off-Chain Signer Let an Attacker Mint 80M Unbacked Tokens and Steal $25M

The Resolv USR Stablecoin Exploit: How a Compromised Off-Chain Signer Let an Attacker Mint 80M Unbacked Tokens and Steal $25M

Comments
5 min read
I Couldn't Find an OAuth 2.1 Proxy for MCP Servers, So I Built One

I Couldn't Find an OAuth 2.1 Proxy for MCP Servers, So I Built One

Comments
3 min read
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Comments
12 min read
I Thought OAuth Was Just Adding a Google Button. Turns Out It's a CSRF Problem Disguised as a Feature.

I Thought OAuth Was Just Adding a Google Button. Turns Out It's a CSRF Problem Disguised as a Feature.

2
Comments 2
8 min read
Cross-Chain Governance Attacks: How Bridged Voting Power Creates a $2B Attack Surface — And 5 Defense Patterns Every DAO Needs Now

Cross-Chain Governance Attacks: How Bridged Voting Power Creates a $2B Attack Surface — And 5 Defense Patterns Every DAO Needs Now

Comments
8 min read
Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?

Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?

Comments
6 min read
The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments

The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments

1
Comments
3 min read
The Math Behind RSA #3: Implementing RSA from Scratch in Python

The Math Behind RSA #3: Implementing RSA from Scratch in Python

Comments
7 min read
Solana's Noisy Neighbor Attack: How Localized Fee Markets Let Attackers Block Your DeFi Liquidations — And the Detection Toolkit to Stop Them

Solana's Noisy Neighbor Attack: How Localized Fee Markets Let Attackers Block Your DeFi Liquidations — And the Detection Toolkit to Stop Them

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.