DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
When “Private” Files Leak: How I Fixed a Silent Azure Storage Misconfiguration

When “Private” Files Leak: How I Fixed a Silent Azure Storage Misconfiguration

2
Comments
5 min read
Links on the web: blind click vs. transparency

Links on the web: blind click vs. transparency

1
Comments
3 min read
The OWASP MCP Top 10: Why Your AI Agents Are Vulnerable

The OWASP MCP Top 10: Why Your AI Agents Are Vulnerable

1
Comments
5 min read
We Scanned 39 AI Agent Frameworks Against OWASP Agentic AI Top 10 -- Here Are The Results

We Scanned 39 AI Agent Frameworks Against OWASP Agentic AI Top 10 -- Here Are The Results

Comments
2 min read
How to Read Findings: Fast, Clear, Actionable

How to Read Findings: Fast, Clear, Actionable

Comments
2 min read
The McKinsey AI Breach Isn't About SQL Injection. It's About Writable System Prompts.

The McKinsey AI Breach Isn't About SQL Injection. It's About Writable System Prompts.

Comments
6 min read
I Built a GitHub Action to Stop AI-Generated PRs Before They Reach My Queue

I Built a GitHub Action to Stop AI-Generated PRs Before They Reach My Queue

4
Comments 2
3 min read
Solana's Near-Death Experience: Two Critical Consensus Bugs That Could Have Halted the Network

Solana's Near-Death Experience: Two Critical Consensus Bugs That Could Have Halted the Network

Comments
7 min read
Your AI Agent Doesn't Have an Off Switch. Here's How to Add One.

Your AI Agent Doesn't Have an Off Switch. Here's How to Add One.

Comments
5 min read
I built a static analyzer that would have caught the tj-actions supply-chain attack before it executed

I built a static analyzer that would have caught the tj-actions supply-chain attack before it executed

1
Comments
1 min read
Youth Shield: Teaching Emotional Drift Literacy as a Security Skill

Youth Shield: Teaching Emotional Drift Literacy as a Security Skill

2
Comments
3 min read
Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️

Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️

1
Comments
1 min read
Glassworm: How Invisible Unicode Characters and Solana Are Powering the Biggest Supply Chain Attack of 2026

Glassworm: How Invisible Unicode Characters and Solana Are Powering the Biggest Supply Chain Attack of 2026

1
Comments
5 min read
How Developers Can Prevent Frontend Wallet Drainer Attacks: A Case Study of the BONK.fun Hack

How Developers Can Prevent Frontend Wallet Drainer Attacks: A Case Study of the BONK.fun Hack

Comments
4 min read
Preventing Rogue AI Agents

Preventing Rogue AI Agents

Comments
20 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.