DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I scanned 20 popular Python packages for dangerous regex patterns. Here is what I found.

I scanned 20 popular Python packages for dangerous regex patterns. Here is what I found.

Comments
4 min read
The Agent Custody Problem

The Agent Custody Problem

Comments
4 min read
Anthropic Just Released a Model So Dangerous They Gave It to Only Security Researchers

Anthropic Just Released a Model So Dangerous They Gave It to Only Security Researchers

Comments
2 min read
Anthropic Just Released a Model Too Dangerous for Public Use. They Called It Project Glasswing.

Anthropic Just Released a Model Too Dangerous for Public Use. They Called It Project Glasswing.

Comments
3 min read
I built an open-source OSINT platform with 20+ recon modules and AI analysis

I built an open-source OSINT platform with 20+ recon modules and AI analysis

Comments
2 min read
Why Your Open-Source Dependencies Are a Ticking Time Bomb (And How to Defuse Them)

Why Your Open-Source Dependencies Are a Ticking Time Bomb (And How to Defuse Them)

Comments
5 min read
Detecting Deepfake Audio in Python: Why the Threshold Matters More Than the Model

Detecting Deepfake Audio in Python: Why the Threshold Matters More Than the Model

1
Comments
5 min read
Kiro for Input Validation: Preventing Injection Attacks

Kiro for Input Validation: Preventing Injection Attacks

Comments
5 min read
If AI writes the code, who tests it?

If AI writes the code, who tests it?

Comments
6 min read
We Audited 1,000+ Cold Email Domains. 67% Had Broken DNS Authentication.

We Audited 1,000+ Cold Email Domains. 67% Had Broken DNS Authentication.

Comments
2 min read
How I Detect Multi-Turn Prompt Injections Without ML

How I Detect Multi-Turn Prompt Injections Without ML

Comments
5 min read
PicoCTF Cookies ( Web Exploitation )

PicoCTF Cookies ( Web Exploitation )

Comments
1 min read
MCP Security Vulnerabilities in 2026: Command Injection, SSRF & Mitigation Strategies

MCP Security Vulnerabilities in 2026: Command Injection, SSRF & Mitigation Strategies

1
Comments
1 min read
I built a Graph database to catch money launderers. Here's what I actually learned.

I built a Graph database to catch money launderers. Here's what I actually learned.

Comments
5 min read
Your agent broke something. Now nobody knows who to blame.

Your agent broke something. Now nobody knows who to blame.

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.