DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Top 5 Solidity Vulnerabilities in 2026

Top 5 Solidity Vulnerabilities in 2026

Comments
2 min read
Oracle Manipulation Attacks: Chainlink vs TWAP vs Custom Feeds

Oracle Manipulation Attacks: Chainlink vs TWAP vs Custom Feeds

Comments
5 min read
Zenvra, an AI-powered vulnerability scanner for AI-generated code (open source)

Zenvra, an AI-powered vulnerability scanner for AI-generated code (open source)

Comments
1 min read
Google's AI Watermark Was Cracked. Here's What That Tells Us About AI Trust.

Google's AI Watermark Was Cracked. Here's What That Tells Us About AI Trust.

Comments
4 min read
The production disasters we've watched happen, and the habit that would have prevented all of them

The production disasters we've watched happen, and the habit that would have prevented all of them

Comments
6 min read
When to test what: honest notes from eight years of picking the wrong strategy

When to test what: honest notes from eight years of picking the wrong strategy

Comments
6 min read
The automation engineer who couldn't reproduce the bug

The automation engineer who couldn't reproduce the bug

Comments
6 min read
I built a free public REST API to check CRA compliance for WordPress plugins and Rust crates

I built a free public REST API to check CRA compliance for WordPress plugins and Rust crates

Comments
1 min read
Reconciling 15 OSS Vulnerability Databases: What They Actually Cover

Reconciling 15 OSS Vulnerability Databases: What They Actually Cover

Comments
12 min read
Anthropic Accidentally Published 513K Lines of Claude Code Source on npm — What Developers Need to Know

Anthropic Accidentally Published 513K Lines of Claude Code Source on npm — What Developers Need to Know

Comments
2 min read
Why Cursor Generates Wildcard CORS in Every Express App

Why Cursor Generates Wildcard CORS in Every Express App

Comments
3 min read
CUPS RCE-to-Root, AI Sandbox Escape, & LittleSnitch for Linux

CUPS RCE-to-Root, AI Sandbox Escape, & LittleSnitch for Linux

Comments
3 min read
How I Traced the Bybit $1.5B Hack On-Chain (And Built a Tool to Do It)

How I Traced the Bybit $1.5B Hack On-Chain (And Built a Tool to Do It)

Comments
1 min read
Pod Security Standards: A Security-First Guide

Pod Security Standards: A Security-First Guide

Comments
5 min read
HTTPS Secures Data in Transit, Protecting Personal Information on Insecure Wi-Fi Networks

HTTPS Secures Data in Transit, Protecting Personal Information on Insecure Wi-Fi Networks

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.