DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The IoTeX Bridge Hack: Anatomy of a $4.4M Private Key Compromise That Exposed DeFi's Weakest Link

The IoTeX Bridge Hack: Anatomy of a $4.4M Private Key Compromise That Exposed DeFi's Weakest Link

1
Comments
6 min read
I Got Sick of Getting Rugged, So I Built a Rug-Pull Detection Engine in Rust

I Got Sick of Getting Rugged, So I Built a Rug-Pull Detection Engine in Rust

2
Comments
6 min read
Why I ditched "Soft Deletes" for S3: Building a Physical Purge Workflow

Why I ditched "Soft Deletes" for S3: Building a Physical Purge Workflow

1
Comments
2 min read
I built a free dev tools site after almost leaking my staging credentials into a "popular" online JWT decoder

I built a free dev tools site after almost leaking my staging credentials into a "popular" online JWT decoder

Comments
1 min read
Authentication vs Authorization

Authentication vs Authorization

1
Comments
2 min read
How to Implement OAuth 2.1 with JWT Refresh Tokens in Node.js (2026 Guide)

How to Implement OAuth 2.1 with JWT Refresh Tokens in Node.js (2026 Guide)

1
Comments
9 min read
1,149 Humans Tried to Social-Engineer Our AI Banker. Here's What OWASP's Agentic Framework Missed.

1,149 Humans Tried to Social-Engineer Our AI Banker. Here's What OWASP's Agentic Framework Missed.

1
Comments
8 min read
GitGuardian MCP: Secret Scanning as a Hard Merge Gate for AI-Generated Code

GitGuardian MCP: Secret Scanning as a Hard Merge Gate for AI-Generated Code

1
Comments
4 min read
Securing ERC-4626 Vaults in Production: A Developer's Checklist After the sDOLA Donation Attack

Securing ERC-4626 Vaults in Production: A Developer's Checklist After the sDOLA Donation Attack

1
Comments
5 min read
TriNet

TriNet

1
Comments
2 min read
Prompt Chainmail: Workflows and integration examples - part 2

Prompt Chainmail: Workflows and integration examples - part 2

1
Comments
5 min read
GWLB in Production: 9 Pitfalls That Break Your Firewall Architecture

GWLB in Production: 9 Pitfalls That Break Your Firewall Architecture

1
Comments
13 min read
API Key Security Best Practices Every Developer Should Know.

API Key Security Best Practices Every Developer Should Know.

1
Comments
2 min read
Review: GitHub Agentic Workflows Security Architecture Translated into Enforceable CI/CD Guardrails for Drupal and WordPress ...

Review: GitHub Agentic Workflows Security Architecture Translated into Enforceable CI/CD Guardrails for Drupal and WordPress ...

1
Comments
3 min read
How I Built a MITRE ATT&CK Threat Mapping Dashboard in Python

How I Built a MITRE ATT&CK Threat Mapping Dashboard in Python

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.