DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Output Provenance: Proving What Your AI Agent Actually Said

Output Provenance: Proving What Your AI Agent Actually Said

Comments
2 min read
220,000+ OpenClaw Instances Are Exposed. Here's How to Check Yours.

220,000+ OpenClaw Instances Are Exposed. Here's How to Check Yours.

1
Comments
3 min read
EVMbench Deep Dive: Can AI Agents Actually Find Smart Contract Bugs Better Than Human Auditors? We Tested the Claims

EVMbench Deep Dive: Can AI Agents Actually Find Smart Contract Bugs Better Than Human Auditors? We Tested the Claims

1
Comments
7 min read
Building a Zero-to-Production Solana Security Pipeline in 2026: Trident Fuzzing + Sec3 X-ray + AI Audit Agents in One GitHub Action

Building a Zero-to-Production Solana Security Pipeline in 2026: Trident Fuzzing + Sec3 X-ray + AI Audit Agents in One GitHub Action

Comments
6 min read
Zitadel Has a Free API: Self-Hosted Identity and Auth That Replaces Auth0

Zitadel Has a Free API: Self-Hosted Identity and Auth That Replaces Auth0

Comments
2 min read
Your Enterprise Customer Just Asked for a SOC 2 Type 2 Report. Now What?

Your Enterprise Customer Just Asked for a SOC 2 Type 2 Report. Now What?

3
Comments
6 min read
CVE-2026-33017: How a Single HTTP Request to Langflow Lets Attackers Drain Every Crypto Wallet Your AI Agent Touches

CVE-2026-33017: How a Single HTTP Request to Langflow Lets Attackers Drain Every Crypto Wallet Your AI Agent Touches

Comments
6 min read
GPUs in Every PoP: Inside Cato Neural Edge and the Shift to GPU-Accelerated Cloud Security

GPUs in Every PoP: Inside Cato Neural Edge and the Shift to GPU-Accelerated Cloud Security

Comments
5 min read
The CrossCurve $3M Bridge Exploit: How One Missing Check Let Attackers Forge Cross-Chain Messages

The CrossCurve $3M Bridge Exploit: How One Missing Check Let Attackers Forge Cross-Chain Messages

2
Comments
5 min read
Supply Chain Key Theft in npm: How 5 Typosquatted Packages Silently Drain Solana and Ethereum Wallets — And a 7-Step Defense Playbook

Supply Chain Key Theft in npm: How 5 Typosquatted Packages Silently Drain Solana and Ethereum Wallets — And a 7-Step Defense Playbook

Comments
5 min read
7 Mac Apps That Protect Your Privacy and Security as a Developer in 2026

7 Mac Apps That Protect Your Privacy and Security as a Developer in 2026

Comments
3 min read
How Commit–Reveal Makes a 50-50 Coin Flip Actually Fair on Base

How Commit–Reveal Makes a 50-50 Coin Flip Actually Fair on Base

Comments
3 min read
Cerbos Has a Free API: Add Authorization to Any App in 5 Minutes Without Writing Policy Logic

Cerbos Has a Free API: Add Authorization to Any App in 5 Minutes Without Writing Policy Logic

Comments
3 min read
OpenClaw's Credential Problem Is Structural, Not Incidental

OpenClaw's Credential Problem Is Structural, Not Incidental

Comments
3 min read
Cerbos Has a Free API: The Open-Source Authorization Engine That Decouples Access Control From Your Application Code

Cerbos Has a Free API: The Open-Source Authorization Engine That Decouples Access Control From Your Application Code

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.