DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Credential Nobody Owned

The Credential Nobody Owned

Comments
7 min read
The Private Key Pandemic: Why 60% of 2026's DeFi Losses Come From Off-Chain Failures — And a Defense Blueprint

The Private Key Pandemic: Why 60% of 2026's DeFi Losses Come From Off-Chain Failures — And a Defense Blueprint

Comments
5 min read
Prompt Injection Defense: The Input Sanitization Patterns That Actually Work

Prompt Injection Defense: The Input Sanitization Patterns That Actually Work

Comments
2 min read
Ritual Protocol: a key as an action, not an object

Ritual Protocol: a key as an action, not an object

1
Comments
2 min read
OAuth Token Vault Patterns for AI Agents

OAuth Token Vault Patterns for AI Agents

1
Comments
7 min read
The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics

The Attack Cost Escalation Model: Why Physical Security Changes Adversary Economics

Comments
3 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

1
Comments
4 min read
ShieldCortex: What We Learned Protecting AI Agent Memory

ShieldCortex: What We Learned Protecting AI Agent Memory

Comments
6 min read
Blockchain as Botnet: How Glassworm Turned Solana Memos Into an Unkillable C2 Channel — And How to Defend Your Pipeline

Blockchain as Botnet: How Glassworm Turned Solana Memos Into an Unkillable C2 Channel — And How to Defend Your Pipeline

Comments
6 min read
Understanding Linux Network Namespaces: How Containers Isolate and Connect Networks

Understanding Linux Network Namespaces: How Containers Isolate and Connect Networks

Comments
4 min read
Fintech Backend Architecture: Building Systems That Don't Break (When Money Is Involved)

Fintech Backend Architecture: Building Systems That Don't Break (When Money Is Involved)

Comments
7 min read
Flash Loan-Resistant Oracle Design: A 2026 Defense Playbook with Solidity Patterns

Flash Loan-Resistant Oracle Design: A 2026 Defense Playbook with Solidity Patterns

Comments
5 min read
SQL Injection in Cursor-Generated Code: What Gets Missed

SQL Injection in Cursor-Generated Code: What Gets Missed

1
Comments
3 min read
Stock Market Real-Time Data Analytics Pipeline on AWS

Stock Market Real-Time Data Analytics Pipeline on AWS

1
Comments
5 min read
Alpenglow 20+20 Security Model: Why Solana New Consensus Halves Byzantine Tolerance

Alpenglow 20+20 Security Model: Why Solana New Consensus Halves Byzantine Tolerance

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.