DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Built a Security Firewall for AI Agents — Here's Why Every MCP Server Needs One

I Built a Security Firewall for AI Agents — Here's Why Every MCP Server Needs One

3
Comments
4 min read
Your SSH Keys Are Naked and It's Your Fault

Your SSH Keys Are Naked and It's Your Fault

Comments
6 min read
JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

2
Comments
6 min read
Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

Why I Don't Trust Server-Side Password Generators (And You Shouldn't Either) 🔐

4
Comments 1
1 min read
How to Attack a RAG System — and Why Your Security Scanner Won't Catch It

How to Attack a RAG System — and Why Your Security Scanner Won't Catch It

Comments 1
6 min read
ClamAv with Rust-TUI

ClamAv with Rust-TUI

1
Comments
1 min read
We stress-tested our own AI agent guardrails before launch. Here's what broke.

We stress-tested our own AI agent guardrails before launch. Here's what broke.

Comments 5
5 min read
Your Identity System Is Your Biggest Single Point of Failure

Your Identity System Is Your Biggest Single Point of Failure

1
Comments
5 min read
Zero-Width Steganography: Invisible Commands Manipulate AI Agents

Zero-Width Steganography: Invisible Commands Manipulate AI Agents

1
Comments
3 min read
How to hash passwords before saving it on database in Node.js

How to hash passwords before saving it on database in Node.js

1
Comments 2
2 min read
Zero-Width Steganography: Invisible Commands Manipulate AI Agents

Zero-Width Steganography: Invisible Commands Manipulate AI Agents

Comments
3 min read
How to Measure Passkey Adoption: Funnels, Activation, and Device Insights

How to Measure Passkey Adoption: Funnels, Activation, and Device Insights

Comments
3 min read
Secure Remote Access to AWS Resources from On-Premises

Secure Remote Access to AWS Resources from On-Premises

6
Comments
2 min read
🔑 Cloud Policy Abuse: The IAM Blind Spot

🔑 Cloud Policy Abuse: The IAM Blind Spot

Comments
6 min read
Sub-Table Security

Sub-Table Security

Comments
12 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.