DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Keras Deserialization Safe Mode: Security Capabilities and Limitations

Keras Deserialization Safe Mode: Security Capabilities and Limitations

Comments
3 min read
Plain Text Auth Config vs Managed Services: When to DIY and When to Delegate

Plain Text Auth Config vs Managed Services: When to DIY and When to Delegate

Comments
5 min read
I built a security scanner for AI agent skills — paid per scan via x402, no API keys published #ai #security #x402 #openclaw

I built a security scanner for AI agent skills — paid per scan via x402, no API keys published #ai #security #x402 #openclaw

Comments
3 min read
False Positives in Child Safety AI: Architecture Tradeoffs and Why They Matter

False Positives in Child Safety AI: Architecture Tradeoffs and Why They Matter

Comments
6 min read
NCMEC Mandatory Reporting for Online Platforms: What Developers Need to Know

NCMEC Mandatory Reporting for Online Platforms: What Developers Need to Know

Comments
6 min read
Prowler is great. Here's what to do with 400 findings.

Prowler is great. Here's what to do with 400 findings.

Comments
4 min read
The agent didn't malfunction. The access was wrong.

The agent didn't malfunction. The access was wrong.

Comments
2 min read
Two Types of npm Supply Chain Attack: What Catches Each

Two Types of npm Supply Chain Attack: What Catches Each

Comments
5 min read
Separating Agent Tool Calls from Authorization and Evidence

Separating Agent Tool Calls from Authorization and Evidence

Comments
10 min read
Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Comments
8 min read
How a $292M Exploit Redefined Cross-Chain Security: The KelpDAO Incident

How a $292M Exploit Redefined Cross-Chain Security: The KelpDAO Incident

Comments
2 min read
DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 5 - Container Scanning with Trivy

DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 5 - Container Scanning with Trivy

Comments
4 min read
COPPA Compliance for Platform Developers: What the Law Actually Requires and How to Build It

COPPA Compliance for Platform Developers: What the Law Actually Requires and How to Build It

Comments
7 min read
Add Child Safety to Your Platform in 30 Minutes: A SENTINEL Integration Guide

Add Child Safety to Your Platform in 30 Minutes: A SENTINEL Integration Guide

Comments
5 min read
DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 4 - IaC Scanning with Checkov

DevSecOps in Practice: Tools That Actually Catch Vulnerabilities - Part 4 - IaC Scanning with Checkov

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.