DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Claude Code Deleted My Entire Home Directory. Here's What I Built to Prevent It.

Claude Code Deleted My Entire Home Directory. Here's What I Built to Prevent It.

Comments
6 min read
$599K Lost to Address Poisoning: A Technical Post-Mortem on UI/UX Vulnerabilities

$599K Lost to Address Poisoning: A Technical Post-Mortem on UI/UX Vulnerabilities

Comments
3 min read
Fortifying Web Applications: Understanding CSRF (Cross-Site Request Forgery)

Fortifying Web Applications: Understanding CSRF (Cross-Site Request Forgery)

1
Comments
2 min read
OPA (Open Policy Agent) with Gatekeeper

OPA (Open Policy Agent) with Gatekeeper

2
Comments
7 min read
The Unseen Math Behind Your SAST Tool: How Static Analysis Works Its Magic

The Unseen Math Behind Your SAST Tool: How Static Analysis Works Its Magic

1
Comments
4 min read
How We Made 'One CPU, One Vote' Actually Work (After 17 Years of Broken Promises)

How We Made 'One CPU, One Vote' Actually Work (After 17 Years of Broken Promises)

Comments
10 min read
Verify Post-Quantum TLS Negotiation from Python `requests` on Linux

Verify Post-Quantum TLS Negotiation from Python `requests` on Linux

Comments
4 min read
GHSA-33HQ-FVWR-56PM: The Billion-Comma Attack: Nuking Svelte SSR with Sparse Arrays

GHSA-33HQ-FVWR-56PM: The Billion-Comma Attack: Nuking Svelte SSR with Sparse Arrays

Comments
2 min read
GHSA-6C9J-X93C-RW6J: OpenClaw Side-Channel: The `safeBins` File Existence Oracle

GHSA-6C9J-X93C-RW6J: OpenClaw Side-Channel: The `safeBins` File Existence Oracle

Comments
2 min read
Week 6 OAuth2 Conceptual Quiz

Week 6 OAuth2 Conceptual Quiz

1
Comments
10 min read
Client-Side Security: Why Our Developer Tools Never Touch Your Data

Client-Side Security: Why Our Developer Tools Never Touch Your Data

Comments
3 min read
Protecting Language Models Against Unauthorized Distillation through Trace Rewriting

Protecting Language Models Against Unauthorized Distillation through Trace Rewriting

Comments
4 min read
We hid backdoors in binaries — Opus 4.6 found 49% of them

We hid backdoors in binaries — Opus 4.6 found 49% of them

Comments
13 min read
Authentication That Actually Passes Security Audits

Authentication That Actually Passes Security Audits

Comments
5 min read
We Scanned 20 SaaS Tools for Trust Readiness — Here’s What Buyers Can See

We Scanned 20 SaaS Tools for Trust Readiness — Here’s What Buyers Can See

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.