DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I can't whisper

I can't whisper

Comments
3 min read
Your Dockerfile Scanner Should Break the Build

Your Dockerfile Scanner Should Break the Build

Comments
2 min read
Securing AI Agents in DeFi: 5 Attack Surfaces You Must Address Before Your Trading Bot Goes Live

Securing AI Agents in DeFi: 5 Attack Surfaces You Must Address Before Your Trading Bot Goes Live

1
Comments
7 min read
CREATE2 Metamorphic Contract Detection in a Post-Dencun World: The Shapeshifting Threat That Didn't Die

CREATE2 Metamorphic Contract Detection in a Post-Dencun World: The Shapeshifting Threat That Didn't Die

Comments
6 min read
AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.

AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.

Comments
7 min read
RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models

RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models

2
Comments 2
15 min read
How We Ensured API Keys Never Linger in RAM

How We Ensured API Keys Never Linger in RAM

2
Comments
3 min read
I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included

I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included

Comments
10 min read
When a Simple Security Audit Turns Into a 3-Hour Python Environment Battle (And How We Won)

When a Simple Security Audit Turns Into a 3-Hour Python Environment Battle (And How We Won)

Comments
3 min read
We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

Comments
10 min read
The Resolv Labs USR Exploit: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

The Resolv Labs USR Exploit: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

1
Comments
4 min read
Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

1
Comments
3 min read
Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Comments
14 min read
Secure by Design: Managing Docker Swarm Secrets the SwarmCLI Way

Secure by Design: Managing Docker Swarm Secrets the SwarmCLI Way

Comments
3 min read
Waygate MCP v2.1.0: From Forensic Analysis to Production Enterprise Server with TaskWarrior

Waygate MCP v2.1.0: From Forensic Analysis to Production Enterprise Server with TaskWarrior

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.