DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
48 Hours After Publishing: Second-Order Injection Field Notes

48 Hours After Publishing: Second-Order Injection Field Notes

1
Comments
2 min read
If your refresh token gets stolen, rotation alone won't save you — here's what does

If your refresh token gets stolen, rotation alone won't save you — here's what does

Comments
2 min read
Reverse Engineering a Modern Phishing Kit (2026 Edition)

Reverse Engineering a Modern Phishing Kit (2026 Edition)

Comments
8 min read
Your Slow Website is a Legal Risk: Why Technical Debt is Now a Liability

Your Slow Website is a Legal Risk: Why Technical Debt is Now a Liability

Comments
4 min read
Your security tool should tell users what to change, not just what's wrong

Your security tool should tell users what to change, not just what's wrong

Comments
7 min read
What Happens When You Type a URL in Your Browser?

What Happens When You Type a URL in Your Browser?

1
Comments 1
3 min read
The admiral just quoted our thesis on the Senate floor

The admiral just quoted our thesis on the Senate floor

Comments
3 min read
KIOKU v0.5.0 + v0.5.1 — unified ingest router + hot cache, shipped same day

KIOKU v0.5.0 + v0.5.1 — unified ingest router + hot cache, shipped same day

Comments
9 min read
Gatekeeping Your Software

Gatekeeping Your Software

2
Comments
5 min read
Building Scync: Why I made a Zero-Knowledge Secrets Manager for us, Developers.

Building Scync: Why I made a Zero-Knowledge Secrets Manager for us, Developers.

8
Comments 1
7 min read
3 Ways Your AI Agent Can Alert You: Push, Telegram, and WalletConnect Notifications

3 Ways Your AI Agent Can Alert You: Push, Telegram, and WalletConnect Notifications

Comments
4 min read
The state of PrestaShop stores in 2026: what we learned scanning 130 of them

The state of PrestaShop stores in 2026: what we learned scanning 130 of them

Comments
6 min read
Remote Server Monitoring over VPN: A Docker Approach (Part 2)

Remote Server Monitoring over VPN: A Docker Approach (Part 2)

Comments
4 min read
Deploy a Private Website with Cloudflare Zero Trust and Terraform

Deploy a Private Website with Cloudflare Zero Trust and Terraform

Comments
2 min read
OpenMythos Teardown: Dissecting the Open-Source Reconstruction of Claude Mythos

OpenMythos Teardown: Dissecting the Open-Source Reconstruction of Claude Mythos

Comments
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.