DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Host Problem: Why Prompt Scanning Isn't Enough for AI Agent Security

The Host Problem: Why Prompt Scanning Isn't Enough for AI Agent Security

1
Comments 5
4 min read
Qwen 3.5-Plus God Mode: 5-Stage Safety Bypass — Full Attack Chain

Qwen 3.5-Plus God Mode: 5-Stage Safety Bypass — Full Attack Chain

4
Comments 6
1 min read
The Unofficial Guide to Reconstructing a Cloud Breach in Minutes

The Unofficial Guide to Reconstructing a Cloud Breach in Minutes

2
Comments
4 min read
CVE-2026-20897: Unlock Everything: The Gitea LFS IDOR (CVE-2026-20897)

CVE-2026-20897: Unlock Everything: The Gitea LFS IDOR (CVE-2026-20897)

Comments
2 min read
Breaking the 400ms LCP Barrier: Next.js 15 & RFC 8058 Case Study.

Breaking the 400ms LCP Barrier: Next.js 15 & RFC 8058 Case Study.

2
Comments
1 min read
Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping

Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping

7
Comments 2
3 min read
AI Coding Security: The Vibe-Coding Risk Nobody Reviews

AI Coding Security: The Vibe-Coding Risk Nobody Reviews

3
Comments
12 min read
Introducing Biopass: Modern Multi-Modal Biometric Login for Linux

Introducing Biopass: Modern Multi-Modal Biometric Login for Linux

1
Comments
3 min read
ChatGPT Can Read Your Corporate Email — And You Probably Already Gave It Permission

ChatGPT Can Read Your Corporate Email — And You Probably Already Gave It Permission

4
Comments
5 min read
Data Privacy 2026: Why AES-256 and FPE Aren't Enough Anymore

Data Privacy 2026: Why AES-256 and FPE Aren't Enough Anymore

Comments
13 min read
Malicious npm Package in Baileys Fork (Skyzopedia Case)

Malicious npm Package in Baileys Fork (Skyzopedia Case)

2
Comments
5 min read
Building Tamper-Evident Audit Trails: What the 2025 Trading Crisis Taught Us About Cryptographic Logging

Building Tamper-Evident Audit Trails: What the 2025 Trading Crisis Taught Us About Cryptographic Logging

Comments
13 min read
Passkeys 2026: Adoption Is Exploding — But Access Architecture Still Decides Security

Passkeys 2026: Adoption Is Exploding — But Access Architecture Still Decides Security

2
Comments
3 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

3
Comments
2 min read
Laravel Security Best Practices: Protecting Against Common Vulnerabilities

Laravel Security Best Practices: Protecting Against Common Vulnerabilities

71
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.