DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Preventing Insecure Inter-Agent Communication in AI Agents

Preventing Insecure Inter-Agent Communication in AI Agents

Comments
23 min read
Preventing Identity and Privilege Abuse in AI Agents

Preventing Identity and Privilege Abuse in AI Agents

Comments
13 min read
Preventing Memory and Context Poisoning in AI Agents

Preventing Memory and Context Poisoning in AI Agents

Comments
17 min read
Securing AI Agents: Implementing the OWASP Top 10 for Agentic Applications to my Health Data Agent

Securing AI Agents: Implementing the OWASP Top 10 for Agentic Applications to my Health Data Agent

Comments
8 min read
Preventing Cascading Failures in AI Agents

Preventing Cascading Failures in AI Agents

1
Comments
24 min read
Preventing Agent Goal Hijack in AI Agents

Preventing Agent Goal Hijack in AI Agents

Comments
13 min read
Bypassing Attestation Logic in Cairo: A Starknet Security Case Study

Bypassing Attestation Logic in Cairo: A Starknet Security Case Study

1
Comments
2 min read
How to Detect Prompt Injection in AI Browser Agents Using Visual Replay

How to Detect Prompt Injection in AI Browser Agents Using Visual Replay

Comments
3 min read
Enabling HTTPS on an Application Server using Keytool

Enabling HTTPS on an Application Server using Keytool

1
Comments 3
4 min read
Vaultwarden vs KeeWeb: Which Password Manager?

Vaultwarden vs KeeWeb: Which Password Manager?

Comments
4 min read
We Tested Agentic AI Against 525 Real Attacks. Here's What We Found.

We Tested Agentic AI Against 525 Real Attacks. Here's What We Found.

Comments
3 min read
Your AI Agents Have 50x More Identities Than Your Employees

Your AI Agents Have 50x More Identities Than Your Employees

1
Comments
8 min read
Add Wallet Verification to a LangChain Agent in 5 Minutes

Add Wallet Verification to a LangChain Agent in 5 Minutes

Comments
3 min read
API Testing Lesson: Sometimes the Documentation is the Vulnerability

API Testing Lesson: Sometimes the Documentation is the Vulnerability

1
Comments
1 min read
I Built a GlassWorm Detector — Here's How Invisible Unicode Attacks Actually Work

I Built a GlassWorm Detector — Here's How Invisible Unicode Attacks Actually Work

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.