DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

My AI Agent Auto-Approved Its Own Decision. Then Another Agent Executed It. No Human in the Loop.

Comments 2
5 min read
Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Moltbook is the Party. AgentMesh is the Bouncer. 🦞🛡️

Comments
3 min read
MIME Sniffing — the API issue nobody notices until it bites

MIME Sniffing — the API issue nobody notices until it bites

1
Comments
1 min read
PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

4
Comments
3 min read
The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

1
Comments
3 min read
Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

2
Comments
5 min read
The Cybersecurity Ego Taxonomy

The Cybersecurity Ego Taxonomy

19
Comments 4
2 min read
Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store

Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store

Comments
1 min read
Bridging the Cloud: A Step-by-Step Guide to Azure VNet-to-VNet VPNs

Bridging the Cloud: A Step-by-Step Guide to Azure VNet-to-VNet VPNs

1
Comments
3 min read
Designing a Secure and Scalable AWS Architecture: A Practical Guide

Designing a Secure and Scalable AWS Architecture: A Practical Guide

Comments
2 min read
TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

1
Comments 2
3 min read
Password Management - SpringBoot

Password Management - SpringBoot

1
Comments
2 min read
How to Fix Claude Code's Broken Permissions (With Hooks)

How to Fix Claude Code's Broken Permissions (With Hooks)

Comments 1
3 min read
How Browser Fingerprinting Works

How Browser Fingerprinting Works

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.