DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Biometric Key Rotation: Securing Tunnels with Real-Time Wearable Entropy

Biometric Key Rotation: Securing Tunnels with Real-Time Wearable Entropy

Comments
12 min read
🦞 I Built a Safe Autonomous Email Agent with OpenClaw and It Actually Works

OpenClaw Challenge Submission 🦞

🦞 I Built a Safe Autonomous Email Agent with OpenClaw and It Actually Works

5
Comments 1
3 min read
I Fingerprinted 6 Commercial VPNs in 200ms with Open-Source DPI. Here's the Wireshark Data

I Fingerprinted 6 Commercial VPNs in 200ms with Open-Source DPI. Here's the Wireshark Data

1
Comments 1
4 min read
How I Built a Scalable and Secure Streaming Backend with Python (Production Lessons)

How I Built a Scalable and Secure Streaming Backend with Python (Production Lessons)

Comments
3 min read
Why AI Is Breaking Your API Security Model (And Nobody on Your Team Notices)

Why AI Is Breaking Your API Security Model (And Nobody on Your Team Notices)

1
Comments 1
3 min read
KEIBIDROP: Secure File Transfer!

KEIBIDROP: Secure File Transfer!

Comments
1 min read
SOC 2 Type II readiness is an evidence-velocity problem

SOC 2 Type II readiness is an evidence-velocity problem

Comments
8 min read
How to Detect Prompt Injection in Your LLM Agent — Python, 5 Minutes

How to Detect Prompt Injection in Your LLM Agent — Python, 5 Minutes

Comments
5 min read
Add a Consent Screen to Your OIDC Authorization Server with Hono

Add a Consent Screen to Your OIDC Authorization Server with Hono

1
Comments
9 min read
Supabase RLS in production: four traps that silence your queries

Supabase RLS in production: four traps that silence your queries

Comments
6 min read
Deep Dive into Open Agent SDK (Part 5): Session Persistence and Security

Deep Dive into Open Agent SDK (Part 5): Session Persistence and Security

Comments
11 min read
RLS Supabase en prod : quatre pièges qui silencent tes requêtes

RLS Supabase en prod : quatre pièges qui silencent tes requêtes

Comments
7 min read
Automating Essential Eight Compliance Checks with PowerShell

Automating Essential Eight Compliance Checks with PowerShell

Comments
9 min read
Before You Send Logs to Gemini — Strip the PII First

Before You Send Logs to Gemini — Strip the PII First

Comments
2 min read
fast16 Malware Discovery Shows Cyber Sabotage Was Already Mature Before Stuxnet

fast16 Malware Discovery Shows Cyber Sabotage Was Already Mature Before Stuxnet

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.