DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building Own MAC — Part 2: Fixing AES (and accidentally reinventing CMAC)

Building Own MAC — Part 2: Fixing AES (and accidentally reinventing CMAC)

2
Comments
7 min read
How We Built MCP Support in Bifrost (And What We Learned About Agent Security)

How We Built MCP Support in Bifrost (And What We Learned About Agent Security)

5
Comments 2
5 min read
I Built secret2.link to Share Secrets Once

I Built secret2.link to Share Secrets Once

Comments
1 min read
The Kill Switch: Emergency Controls for Autonomous Fleets

The Kill Switch: Emergency Controls for Autonomous Fleets

Comments
4 min read
No todo el riesgo en la IA proviene de intenciones maliciosas

No todo el riesgo en la IA proviene de intenciones maliciosas

Comments
1 min read
Currentonly Scopes in Google Apps Script

Currentonly Scopes in Google Apps Script

Comments
3 min read
Why Your Staging Environment is Lying to You (And How Anonymization Fixes It)

Why Your Staging Environment is Lying to You (And How Anonymization Fixes It)

2
Comments
9 min read
AWS Security Services: A Conversation Between Engineers

AWS Security Services: A Conversation Between Engineers

Comments
24 min read
🚀 Supercarga la Autenticación en NestJS con Firebase

🚀 Supercarga la Autenticación en NestJS con Firebase

Comments
3 min read
I built a resume builder that can't read your resume

I built a resume builder that can't read your resume

Comments
1 min read
Del concepto a la estructura: continuando el trabajo sobre gobernanza de la IA

Del concepto a la estructura: continuando el trabajo sobre gobernanza de la IA

Comments
1 min read
Why and How to Remove Unused WordPress Plugins Safely

Why and How to Remove Unused WordPress Plugins Safely

Comments
3 min read
Trouble with Test After Introducing django-axes

Trouble with Test After Introducing django-axes

Comments
2 min read
Inside Linux TCP: From Handshake to Reset or Close

Inside Linux TCP: From Handshake to Reset or Close

Comments
1 min read
ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.