DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Secured My AI Assistant's Data by Moving It Off the Internet-Facing Machine

How I Secured My AI Assistant's Data by Moving It Off the Internet-Facing Machine

Comments
4 min read
Auditing for Ethereum's Parallel Execution Era: New Attack Vectors and a Foundry Toolkit for Glamsterdam

Auditing for Ethereum's Parallel Execution Era: New Attack Vectors and a Foundry Toolkit for Glamsterdam

Comments
6 min read
The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials From Thousands of AI Environments

The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials From Thousands of AI Environments

Comments
9 min read
Malicious litellm Python Package Versions 1.82.7 and 1.82.8 Removed from PyPI to Prevent Credential Theft

Malicious litellm Python Package Versions 1.82.7 and 1.82.8 Removed from PyPI to Prevent Credential Theft

Comments
6 min read
I Mapped the AI Attack Surface Nobody Else Has: Introducing AAISAF

I Mapped the AI Attack Surface Nobody Else Has: Introducing AAISAF

1
Comments
3 min read
The Proxy Upgrade Kill Chain: 5 Vulnerability Patterns Your Auditor Probably Missed — And the Free Toolkit to Find Them

The Proxy Upgrade Kill Chain: 5 Vulnerability Patterns Your Auditor Probably Missed — And the Free Toolkit to Find Them

Comments
6 min read
Your AI Agent Just Paid a Sanctioned Russian Bank. Nobody Stopped It.

Your AI Agent Just Paid a Sanctioned Russian Bank. Nobody Stopped It.

Comments
3 min read
TIL: Ruby Authenticity Tokens - Reusing the HTML Value

TIL: Ruby Authenticity Tokens - Reusing the HTML Value

1
Comments
2 min read
Introducing SidClaw: The Missing Approval Layer for AI Agents

Introducing SidClaw: The Missing Approval Layer for AI Agents

Comments
4 min read
The Dark Forest Internet

The Dark Forest Internet

Comments
6 min read
How Teleport Works: A Deep Dive into Modern Infrastructure Access

How Teleport Works: A Deep Dive into Modern Infrastructure Access

1
Comments
32 min read
The Venus Protocol Supply Cap Bypass: How a 9-Month Patient Attacker Exploited a Bug That Auditors Found First

The Venus Protocol Supply Cap Bypass: How a 9-Month Patient Attacker Exploited a Bug That Auditors Found First

1
Comments
5 min read
Aderyn vs Slither in 2026: A Head-to-Head for Solidity Static Analysis

Aderyn vs Slither in 2026: A Head-to-Head for Solidity Static Analysis

Comments
4 min read
Solana Developer Platform Launched for Mastercard & Western Union — 7 Security Blind Spots

Solana Developer Platform Launched for Mastercard & Western Union — 7 Security Blind Spots

1
Comments
8 min read
The DBXen ERC2771 Identity Confusion: Why _msgSender() msg.sender Is DeFi's Most Underrated Bug Class

The DBXen ERC2771 Identity Confusion: Why _msgSender() msg.sender Is DeFi's Most Underrated Bug Class

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.