DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-24686: TUF Luck: Escaping the Sandbox in go-tuf via TAP 4 Map Files

CVE-2026-24686: TUF Luck: Escaping the Sandbox in go-tuf via TAP 4 Map Files

Comments
2 min read
The Armored AI Agent You Can Actually Trust

The Armored AI Agent You Can Actually Trust

3
Comments
3 min read
Introducing Trinity Protocol OpenClaw Skill: Unified Multi-Chain Security API

Introducing Trinity Protocol OpenClaw Skill: Unified Multi-Chain Security API

Comments
2 min read
Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes

Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes

Comments
13 min read
Hello World!

Hello World!

1
Comments
1 min read
tokenex adds Vault & OpenBao support: Exchanging ID tokens (JWTs) for secrets without static credentials

tokenex adds Vault & OpenBao support: Exchanging ID tokens (JWTs) for secrets without static credentials

Comments
10 min read
5 Essential Security Headers for Modern Frontend Devs (Next.js, Angular, & Vue)

5 Essential Security Headers for Modern Frontend Devs (Next.js, Angular, & Vue)

Comments
6 min read
Redesigning a Protocol for AI Agents That Interact With the Real World

Redesigning a Protocol for AI Agents That Interact With the Real World

Comments
3 min read
Lateral movement in multi-agent LLM systems

Lateral movement in multi-agent LLM systems

1
Comments
5 min read
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

Comments
1 min read
We got tired of users asking "is this file legit?" so we built a verification system

We got tired of users asking "is this file legit?" so we built a verification system

Comments
2 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Comments
2 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.