DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fortress in a Box: Kubernetes Security for the Organizations That Can't Afford It

Fortress in a Box: Kubernetes Security for the Organizations That Can't Afford It

2
Comments
4 min read
The Documentation Attack Surface: How npm Libraries Teach Insecure Patterns

The Documentation Attack Surface: How npm Libraries Teach Insecure Patterns

Comments
4 min read
Why your agent RBAC is broken (and how to stop webchat from getting exec)

Why your agent RBAC is broken (and how to stop webchat from getting exec)

Comments
4 min read
The IDOR Bug Cursor Keeps Writing Into Your API Routes

The IDOR Bug Cursor Keeps Writing Into Your API Routes

Comments
2 min read
7 CVEs in 48 Hours: How PraisonAI Got Completely Owned — And What Every Agent Framework Should Learn

7 CVEs in 48 Hours: How PraisonAI Got Completely Owned — And What Every Agent Framework Should Learn

Comments
4 min read
PassForge: I Built a Password Workstation Because One Slider Wasn't Enough

PassForge: I Built a Password Workstation Because One Slider Wasn't Enough

Comments
5 min read
How to Remove Sensitive Data from Your Git History (For Real This Time)

How to Remove Sensitive Data from Your Git History (For Real This Time)

1
Comments
5 min read
Building Privacy-Preserving Identity Systems with DIDs on Midnight

Building Privacy-Preserving Identity Systems with DIDs on Midnight

1
Comments 2
14 min read
Designing Secure Authentication with Access & Refresh Tokens

Designing Secure Authentication with Access & Refresh Tokens

Comments
2 min read
# How I Built Cryptographic Identity for AI Agents — In 3 Months, On One Laptop

# How I Built Cryptographic Identity for AI Agents — In 3 Months, On One Laptop

Comments
2 min read
TealTiger v1.1.1: Enterprise-Grade AI Agent Security — Zero Infrastructure Required

TealTiger v1.1.1: Enterprise-Grade AI Agent Security — Zero Infrastructure Required

Comments
7 min read
What is an MCP proxy and why does it need an approval layer?

What is an MCP proxy and why does it need an approval layer?

Comments
3 min read
Claude Code Leaked. Here's What It Means for Your Team's Security Policy.

Claude Code Leaked. Here's What It Means for Your Team's Security Policy.

Comments
3 min read
I Can Read the Entire Internet. I Can't Post a Single Comment.

I Can Read the Entire Internet. I Can't Post a Single Comment.

Comments
3 min read
CVEs are vulnerabilities(!!!) and part 2 of my Notion automation

Automates tracking using Gemini and Kestra

CVEs are vulnerabilities(!!!) and part 2 of my Notion automation

4
Comments 3
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.