DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Verify Post-Quantum TLS Negotiation from Python `requests` on Linux

Verify Post-Quantum TLS Negotiation from Python `requests` on Linux

Comments
4 min read
GHSA-33HQ-FVWR-56PM: The Billion-Comma Attack: Nuking Svelte SSR with Sparse Arrays

GHSA-33HQ-FVWR-56PM: The Billion-Comma Attack: Nuking Svelte SSR with Sparse Arrays

Comments
2 min read
GHSA-6C9J-X93C-RW6J: OpenClaw Side-Channel: The `safeBins` File Existence Oracle

GHSA-6C9J-X93C-RW6J: OpenClaw Side-Channel: The `safeBins` File Existence Oracle

Comments
2 min read
Week 6 OAuth2 Conceptual Quiz

Week 6 OAuth2 Conceptual Quiz

1
Comments
10 min read
Client-Side Security: Why Our Developer Tools Never Touch Your Data

Client-Side Security: Why Our Developer Tools Never Touch Your Data

Comments
3 min read
Protecting Language Models Against Unauthorized Distillation through Trace Rewriting

Protecting Language Models Against Unauthorized Distillation through Trace Rewriting

Comments
4 min read
Authentication That Actually Passes Security Audits

Authentication That Actually Passes Security Audits

Comments
5 min read
We hid backdoors in binaries — Opus 4.6 found 49% of them

We hid backdoors in binaries — Opus 4.6 found 49% of them

Comments
13 min read
Why I Ended Up Adding Sessions to a JWT-Based System

Why I Ended Up Adding Sessions to a JWT-Based System

Comments
2 min read
My Journey Contributing to BLT

My Journey Contributing to BLT

Comments
2 min read
We Scanned 20 SaaS Tools for Trust Readiness — Here’s What Buyers Can See

We Scanned 20 SaaS Tools for Trust Readiness — Here’s What Buyers Can See

Comments
5 min read
98 Bytes That Prove Your Document Existed

98 Bytes That Prove Your Document Existed

Comments
8 min read
Analytics without surveillance: explicit consent, layered gates, and never sending Class A data

Analytics without surveillance: explicit consent, layered gates, and never sending Class A data

Comments
3 min read
CVE-2026-1669: Model Poisoning: Turning Keras Weights into Weaponized File Readers

CVE-2026-1669: Model Poisoning: Turning Keras Weights into Weaponized File Readers

Comments
2 min read
Every Input Is an Attack Vector: A Developer's Guide to Input Validation

Every Input Is an Attack Vector: A Developer's Guide to Input Validation

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.