DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

2
Comments
7 min read
Most Webhook Signatures Are Broken

Most Webhook Signatures Are Broken

1
Comments
3 min read
5 Best Practices for Securing Amazon SageMaker.

5 Best Practices for Securing Amazon SageMaker.

1
Comments
3 min read
Update: We just saved a developer from the "Marko" Scam!

Update: We just saved a developer from the "Marko" Scam!

Comments
1 min read
You Built a Network of Snitches

You Built a Network of Snitches

Comments
11 min read
Convenience is eating security: why “one-click agents” need a stop button

Convenience is eating security: why “one-click agents” need a stop button

Comments
2 min read
myanon — how I anonymize 200GB of MySQL nightly for GDPR-safe dev

myanon — how I anonymize 200GB of MySQL nightly for GDPR-safe dev

Comments
1 min read
Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Comments
13 min read
Prompting Is Making Humans Boom Scroll. Here’s How to Ship Agent Apps Safely

Prompting Is Making Humans Boom Scroll. Here’s How to Ship Agent Apps Safely

1
Comments
12 min read
How to Remove Your Website from a Blacklist: A Complete Recovery Guide

How to Remove Your Website from a Blacklist: A Complete Recovery Guide

Comments
8 min read
Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)

Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)

Comments
4 min read
Deep Dive into VeraSnap: Building a Cryptographic Evidence Camera with Hash Chains, Hardware Signatures, and the VAP Framework

Deep Dive into VeraSnap: Building a Cryptographic Evidence Camera with Hash Chains, Hardware Signatures, and the VAP Framework

Comments
11 min read
CVE-2026-24771: Hono ErrorBoundary: When the Safety Net is the Trap

CVE-2026-24771: Hono ErrorBoundary: When the Safety Net is the Trap

Comments
2 min read
HSTS: the security header everyone forgets (until it quietly matters)

HSTS: the security header everyone forgets (until it quietly matters)

5
Comments
1 min read
CVE-2026-24739: The Equalizer: How a Single Character Deleted Your Drive

CVE-2026-24739: The Equalizer: How a Single Character Deleted Your Drive

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.