DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Nuxt Scripts for improved Performance and Security

Nuxt Scripts for improved Performance and Security

3
Comments
3 min read
The Hidden Threat in Every Image: Why Your Upload Validation is Broken

The Hidden Threat in Every Image: Why Your Upload Validation is Broken

47
Comments 3
8 min read
Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Comments
3 min read
Python For Exploit Development

Python For Exploit Development

Comments
7 min read
Creating production-ready authentication and authorization

Creating production-ready authentication and authorization

Comments
3 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
How to Secure RabbitMQ & Celery with TLS/SSL

How to Secure RabbitMQ & Celery with TLS/SSL

Comments
1 min read
Agent Factory Recap: Can you do my shopping?

Agent Factory Recap: Can you do my shopping?

16
Comments
7 min read
AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

Comments
7 min read
Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

1
Comments
3 min read
Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)

Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)

Comments
6 min read
Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams

Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams

Comments
9 min read
Why Some Android Games Resist Naïve Reverse Engineering

Why Some Android Games Resist Naïve Reverse Engineering

1
Comments
5 min read
How to Use Amazon SNS Data Protection Policies to Prevent Sensitive Data Leakage

How to Use Amazon SNS Data Protection Policies to Prevent Sensitive Data Leakage

2
Comments
4 min read
How to Test Image Rebuilding API: A Step-by-Step Guide

How to Test Image Rebuilding API: A Step-by-Step Guide

104
Comments 2
4 min read
Your ESLint Security Plugin is Missing 80% of Vulnerabilities (I Have Proof)

Your ESLint Security Plugin is Missing 80% of Vulnerabilities (I Have Proof)

Comments
5 min read
Matrix vs Signal Protocol: Why We Chose NOT to Federate

Matrix vs Signal Protocol: Why We Chose NOT to Federate

Comments
3 min read
Why another exchange architecture post?

Why another exchange architecture post?

Comments
8 min read
Why We Built Authentication Without Accounts, Passwords, or Personal Data

Why We Built Authentication Without Accounts, Passwords, or Personal Data

9
Comments 7
2 min read
Why is a secure PDF manipulation tool essential?

Why is a secure PDF manipulation tool essential?

Comments
2 min read
How I built a hybrid LAN/WAN file sync engine without VPN (and why on-demand sync still matters)

How I built a hybrid LAN/WAN file sync engine without VPN (and why on-demand sync still matters)

1
Comments 1
4 min read
API Rate Limiting & Security

API Rate Limiting & Security

Comments
6 min read
Day 9 — Runtime Threat Detection (The Shadow with Red Eyes)

Day 9 — Runtime Threat Detection (The Shadow with Red Eyes)

3
Comments 1
3 min read
loading...