DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

Comments
3 min read
How to safely let AI Agents query your data: 5 Essential Layers

How to safely let AI Agents query your data: 5 Essential Layers

1
Comments
12 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
I built an Advanced Python & JS Obfuscator with AI Auto-Decryption 🛡️

I built an Advanced Python & JS Obfuscator with AI Auto-Decryption 🛡️

1
Comments
2 min read
Unitary Patent in Advisory Practice Strategic reality between numbers, client expectations, and law firm organization

Unitary Patent in Advisory Practice Strategic reality between numbers, client expectations, and law firm organization

5
Comments
4 min read
Why Some Smart Contracts Pass an Audit… But Still Get Hacked.

Why Some Smart Contracts Pass an Audit… But Still Get Hacked.

5
Comments
4 min read
SQL Injection: The Security Nightmare Every Developer Must Understand

SQL Injection: The Security Nightmare Every Developer Must Understand

2
Comments
6 min read
Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

1
Comments
2 min read
From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

6
Comments 2
5 min read
AIDE Daily Automation Build - Checklist Your Implementation Roadmap

AIDE Daily Automation Build - Checklist Your Implementation Roadmap

Comments
2 min read
How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

Comments
5 min read
🚀 Supercarga la Autenticación en NestJS con Firebase

🚀 Supercarga la Autenticación en NestJS con Firebase

2
Comments
3 min read
The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

6
Comments
6 min read
OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know

OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know

Comments
3 min read
Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.