DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 5: C Strings: The Danger of the Null Terminator (\0)

Day 5: C Strings: The Danger of the Null Terminator (\0)

Comments 1
1 min read
Most “Private” Apps Still Leak More Than You Think

Most “Private” Apps Still Leak More Than You Think

Comments
2 min read
The Future of IaC Security: Scanning, Drift Detection and Autoremediation

The Future of IaC Security: Scanning, Drift Detection and Autoremediation

Comments
6 min read
How to protect server functions with auth middleware in TanStack Start

How to protect server functions with auth middleware in TanStack Start

2
Comments 1
3 min read
Logging Into EC2 Is Easy… Until You Pick the Wrong Way

Logging Into EC2 Is Easy… Until You Pick the Wrong Way

1
Comments 1
3 min read
Building a Fail-Closed Investment Risk Gate with Yuer DSL

Building a Fail-Closed Investment Risk Gate with Yuer DSL

Comments
3 min read
Passkey Login & Smart Wallet Creation on Solana with React Native and LazorKit — No More Seed Phrases!

Passkey Login & Smart Wallet Creation on Solana with React Native and LazorKit — No More Seed Phrases!

Comments
9 min read
AWS Bedrock Security Best Practices: Building Secure Generative AI Applications

AWS Bedrock Security Best Practices: Building Secure Generative AI Applications

Comments
4 min read
I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)

I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)

Comments
5 min read
Don't Trust the Client: How I Hacked My Own Coupon System

Don't Trust the Client: How I Hacked My Own Coupon System

Comments
2 min read
Why cookies are unreliable for identifying users

Why cookies are unreliable for identifying users

Comments
2 min read
Data Security in Salesforce: Understanding the Layers That Protect Your Data

Data Security in Salesforce: Understanding the Layers That Protect Your Data

Comments
8 min read
Building a RAM-Only, End-to-End Encrypted Chat for the Terminal (Python)

Building a RAM-Only, End-to-End Encrypted Chat for the Terminal (Python)

Comments
1 min read
Why Rust?

Why Rust?

1
Comments
3 min read
Undo Beats IQ: Building Flamehaven as a Governed AI Runtime (Not a Prompt App)

Undo Beats IQ: Building Flamehaven as a Governed AI Runtime (Not a Prompt App)

Comments
2 min read
Web Application Security & XSS Mitigation Lab

Web Application Security & XSS Mitigation Lab

Comments
1 min read
Run Any MCP Server Securely Without Changing Its Config

Run Any MCP Server Securely Without Changing Its Config

Comments
4 min read
Bloom: Anthropic’s Tool That Changes How We Evaluate AI Safety

Bloom: Anthropic’s Tool That Changes How We Evaluate AI Safety

Comments
7 min read
System Design Autopsy: How 1 Legacy Portal Cost $1.6B (Change Healthcare Analysis)

System Design Autopsy: How 1 Legacy Portal Cost $1.6B (Change Healthcare Analysis)

Comments
1 min read
Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis

Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis

Comments
10 min read
Securing the X402 Protocol: Why Autonomous Agent Payments Need Spending Controls

Securing the X402 Protocol: Why Autonomous Agent Payments Need Spending Controls

Comments
8 min read
Zero-Trust in Internal Microservices: Service Security with an API Gateway

Zero-Trust in Internal Microservices: Service Security with an API Gateway

1
Comments
7 min read
The MCP Revolution: How One Protocol Solved AI's Biggest Integration Problem (Part 1 of 2)

The MCP Revolution: How One Protocol Solved AI's Biggest Integration Problem (Part 1 of 2)

1
Comments 1
5 min read
Under the Hood: How Two-Gate Enforcement Works

Under the Hood: How Two-Gate Enforcement Works

Comments
4 min read
Multisig vs Policy Layers: Which Approach Secures AI Agents Better?

Multisig vs Policy Layers: Which Approach Secures AI Agents Better?

Comments
4 min read
loading...