DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Two Bugs That Kill Startups: A Deep Dive into XSS and CSRF

The Two Bugs That Kill Startups: A Deep Dive into XSS and CSRF

1
Comments
2 min read
89 critical vulnerabilities and nothing is on fire

89 critical vulnerabilities and nothing is on fire

1
Comments
6 min read
Browser automation safety for SetupClaw: what to automate, what to keep manual, and how to handle credentials

Browser automation safety for SetupClaw: what to automate, what to keep manual, and how to handle credentials

Comments
4 min read
What Exactly is "Authentication": From the Limits of Passwords to FIDO2, Passkeys, and IdP Architecture

What Exactly is "Authentication": From the Limits of Passwords to FIDO2, Passkeys, and IdP Architecture

1
Comments
8 min read
What Open Source Maintainers Miss in Large PRs (And How to Catch It)

What Open Source Maintainers Miss in Large PRs (And How to Catch It)

Comments
4 min read
Best Snyk Alternatives in 2026: Open-Source Dependency Security Tools

Best Snyk Alternatives in 2026: Open-Source Dependency Security Tools

Comments
2 min read
ObfusPS — Building a Smart, AST-Aware PowerShell Obfuscation Engine in Go

ObfusPS — Building a Smart, AST-Aware PowerShell Obfuscation Engine in Go

1
Comments
2 min read
The New Cost of Trust: Why Supply Chains and Identity Now Decide Whether Your Product Survives

The New Cost of Trust: Why Supply Chains and Identity Now Decide Whether Your Product Survives

Comments
5 min read
Email Authentication That Holds Up in the Real World (SPF, DKIM, DMARC — and the messy parts)

Email Authentication That Holds Up in the Real World (SPF, DKIM, DMARC — and the messy parts)

Comments
6 min read
I needed Claude Code as a network service for my pipelines. So I built one.

I needed Claude Code as a network service for my pipelines. So I built one.

Comments
3 min read
The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

Comments
3 min read
Reverse Engineering Norwegian Grocery Apps

Reverse Engineering Norwegian Grocery Apps

Comments
7 min read
If It's Free, You're the Product: Investigating Spenderlog

If It's Free, You're the Product: Investigating Spenderlog

Comments
18 min read
Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Comments
5 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.