DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Governance Timelock Bypass: 6 Attack Patterns and How to Design Them Out

Governance Timelock Bypass: 6 Attack Patterns and How to Design Them Out

Comments
6 min read
Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

1
Comments
6 min read
Blockchain as C2 Infrastructure: Dissecting the Windsurf IDE Supply Chain Attack That Weaponized Solana

Blockchain as C2 Infrastructure: Dissecting the Windsurf IDE Supply Chain Attack That Weaponized Solana

Comments
4 min read
Modernizing Kubernetes Image Promoter: Enhancing Performance and Features Without Disruption

Modernizing Kubernetes Image Promoter: Enhancing Performance and Features Without Disruption

Comments
7 min read
The Air-Gapped Chronicles: The Insurance Gap — Building Liability-Resistant AI When Insurance Won't Cover the Risk

The Air-Gapped Chronicles: The Insurance Gap — Building Liability-Resistant AI When Insurance Won't Cover the Risk

Comments
6 min read
Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.

Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.

Comments
6 min read
How I Built a Fake Admin Detection System for Telegram Web3 Communities

How I Built a Fake Admin Detection System for Telegram Web3 Communities

1
Comments
1 min read
5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit

5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit

1
Comments
2 min read
Simulation-Execution Divergence: The Systemic Risk Threatening Every ERC-4337 Bundler

Simulation-Execution Divergence: The Systemic Risk Threatening Every ERC-4337 Bundler

1
Comments
6 min read
Auditing Browser Extensions That Touch Your Crypto: A Practical Toolkit After ShieldGuard and Coruna

Auditing Browser Extensions That Touch Your Crypto: A Practical Toolkit After ShieldGuard and Coruna

Comments
8 min read
I Built a Python Recon Toolkit and It Exposed My Own Server

I Built a Python Recon Toolkit and It Exposed My Own Server

1
Comments
3 min read
3 MCP Security Gateways Launched This Week. None of Them Do Pre-Action Authorization.

3 MCP Security Gateways Launched This Week. None of Them Do Pre-Action Authorization.

Comments
5 min read
How to Detect Credential Stuffing Attacks in Your Nginx Logs

How to Detect Credential Stuffing Attacks in Your Nginx Logs

Comments
3 min read
Trivy Scanner Compromised Again: Malicious Code Found in v0.69.4 and GitHub Actions, Raising Security Concerns

Trivy Scanner Compromised Again: Malicious Code Found in v0.69.4 and GitHub Actions, Raising Security Concerns

Comments
8 min read
We Won a Cybersecurity Award — But Here’s the Real Problem We’re Solving

We Won a Cybersecurity Award — But Here’s the Real Problem We’re Solving

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.