DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Opt-In Safety Is Just Liability Transfer

Opt-In Safety Is Just Liability Transfer

1
Comments 1
4 min read
Your AI Agent Has Root Access to Your Laptop. Here's How to Fix That.

Your AI Agent Has Root Access to Your Laptop. Here's How to Fix That.

Comments 2
3 min read
Mapping AI Infrastructure to the EU AI Act and ISO 42001

Mapping AI Infrastructure to the EU AI Act and ISO 42001

3
Comments
3 min read
How We Architect AI Governance for Real-World Infrastructure

How We Architect AI Governance for Real-World Infrastructure

2
Comments
3 min read
AI-Generated Backends Break in Production. We Replaced Code with Specs.

AI-Generated Backends Break in Production. We Replaced Code with Specs.

Comments 1
3 min read
GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

Comments
2 min read
Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Comments
7 min read
Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Comments 1
7 min read
Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

1
Comments
3 min read
Building a Social Platform with Client-Side End-to-End Encryption

Building a Social Platform with Client-Side End-to-End Encryption

1
Comments 1
9 min read
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

5
Comments
10 min read
A Guide to building Advanced MCPs🏗️

A Guide to building Advanced MCPs🏗️

4
Comments
2 min read
Verification Theater vs. Real Trust: Why Attestation Alone Isn't Enough for TEE-Based Systems

Verification Theater vs. Real Trust: Why Attestation Alone Isn't Enough for TEE-Based Systems

4
Comments 2
5 min read
7 Prompt Injection Attacks That Work on Most AI Chatbots (And How to Block Them)

7 Prompt Injection Attacks That Work on Most AI Chatbots (And How to Block Them)

Comments 1
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.