DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

PortSwigger's Top 10 Web Hacking Techniques of 2025 — A Deep Dive

6
Comments 2
13 min read
Join a Server to Tailscale Using Docker

Join a Server to Tailscale Using Docker

Comments
1 min read
A2UI Authentication Example

A2UI Authentication Example

Comments
3 min read
Bypassing AI Web Sandbox with WebSockets & Retro Browsers

Bypassing AI Web Sandbox with WebSockets & Retro Browsers

Comments
1 min read
JavaScript Redirection Injection

JavaScript Redirection Injection

Comments
2 min read
Why Modern Architectures Keep Failing Security Reviews (It’s Not a Tools Problem)

Why Modern Architectures Keep Failing Security Reviews (It’s Not a Tools Problem)

Comments
2 min read
How to DoS A server

How to DoS A server

Comments
4 min read
GHSA-38CW-85XC-XR9X: Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection

GHSA-38CW-85XC-XR9X: Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection

Comments
2 min read
Stop Shipping Fat Python Docker Images: Multi-Stage Builds Explained

Stop Shipping Fat Python Docker Images: Multi-Stage Builds Explained

1
Comments 1
6 min read
Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Comments
7 min read
CVE-2026-23735: Singleton Roulette: Racing for Context in GraphQL Modules

CVE-2026-23735: Singleton Roulette: Racing for Context in GraphQL Modules

Comments
2 min read
Why image.jpg Isn't Just an Image: A Deep Dive into Metadata & Polyglots

Why image.jpg Isn't Just an Image: A Deep Dive into Metadata & Polyglots

1
Comments 2
4 min read
Bypassing AI Web Sandbox with WebSockets & Retro Browsers

Bypassing AI Web Sandbox with WebSockets & Retro Browsers

Comments
1 min read
CVE-2026-22782: RustFS Leak: When Error Logs Become Credentials

CVE-2026-22782: RustFS Leak: When Error Logs Become Credentials

Comments
2 min read
Private-by-Design: Building Zero-Knowledge AI Health Logs with Homomorphic Encryption 🔒🩺

Private-by-Design: Building Zero-Knowledge AI Health Logs with Homomorphic Encryption 🔒🩺

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.