DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hardware-backed SSH authentication with YubiKey (FIDO2)

Hardware-backed SSH authentication with YubiKey (FIDO2)

Comments 3
3 min read
Delete Your ChatGPT History. Right Now. 🚨

Delete Your ChatGPT History. Right Now. 🚨

7
Comments 2
2 min read
Excessive Agency in Agentic AI: Setting Safe Boundaries

Excessive Agency in Agentic AI: Setting Safe Boundaries

Comments
9 min read
70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

Comments
1 min read
Limiting Public Access and Protecting Sensitive Data in Azure Storage

Limiting Public Access and Protecting Sensitive Data in Azure Storage

Comments
3 min read
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Environment Variables Without the Chaos: A Vault-First Approach

Environment Variables Without the Chaos: A Vault-First Approach

1
Comments
13 min read
The Security Engineering Blueprint: A JavaScript Master Document

The Security Engineering Blueprint: A JavaScript Master Document

Comments
4 min read
Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Comments
2 min read
Vulnerability Case Study: Prompt Injection in Vercel AI Agents

Vulnerability Case Study: Prompt Injection in Vercel AI Agents

Comments
3 min read
The Secret Management Standard: Automating AI Agent Protection

The Secret Management Standard: Automating AI Agent Protection

Comments
2 min read
Using IAM Users in 2026 Is a Life Choice

Using IAM Users in 2026 Is a Life Choice

3
Comments 3
3 min read
How to index my website?

How to index my website?

2
Comments
1 min read
Build Your Own AIDE Automation - Guide

Build Your Own AIDE Automation - Guide

1
Comments
3 min read
Prompt Injection Attacks: The Hidden Security Threat in AI Applications

Prompt Injection Attacks: The Hidden Security Threat in AI Applications

1
Comments
14 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.