DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Hands-On IAM with WSO2 Asgardeo: Configuring SSO, MFA, and Adaptive Authentication

Hands-On IAM with WSO2 Asgardeo: Configuring SSO, MFA, and Adaptive Authentication

Comments
9 min read
Hardening Nginx: A Practical Guide to Modular Security Configuration

Hardening Nginx: A Practical Guide to Modular Security Configuration

1
Comments
4 min read
SPF, DKIM, and DMARC Explained — The 3 DNS Records Every Developer Needs

SPF, DKIM, and DMARC Explained — The 3 DNS Records Every Developer Needs

Comments
2 min read
Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

1
Comments
6 min read
MCP Servers Explained: What They Are, Why They Matter, and Where to Find Them

MCP Servers Explained: What They Are, Why They Matter, and Where to Find Them

1
Comments
5 min read
Why AI Agents Need Guardrails (Not Just Prompts)

Why AI Agents Need Guardrails (Not Just Prompts)

1
Comments
7 min read
Your AI Copilot Might Be Poisoned: RAG Attacks and Why Static Analysis Still Wins

Your AI Copilot Might Be Poisoned: RAG Attacks and Why Static Analysis Still Wins

1
Comments
4 min read
Solana's CPI Security Trap: Why Instruction Introspection Doesn't Make Your Protocol Flash Loan-Proof

Solana's CPI Security Trap: Why Instruction Introspection Doesn't Make Your Protocol Flash Loan-Proof

Comments
4 min read
Writing Custom Semgrep Rules to Catch Solana Anchor Vulnerabilities Before Auditors Do

Writing Custom Semgrep Rules to Catch Solana Anchor Vulnerabilities Before Auditors Do

1
Comments
5 min read
I've seen both sides of credential management — neither works

I've seen both sides of credential management — neither works

1
Comments
6 min read
Dissecting the $1.5B Bybit Hack: How a Supply Chain Attack + delegatecall Hijacked History's Biggest Crypto Heist

Dissecting the $1.5B Bybit Hack: How a Supply Chain Attack + delegatecall Hijacked History's Biggest Crypto Heist

Comments
4 min read
We Shipped Observation-Based Trust Scoring for AI Agents (With a Collaborator We Met Through Our Own Protocol)

We Shipped Observation-Based Trust Scoring for AI Agents (With a Collaborator We Met Through Our Own Protocol)

1
Comments
3 min read
🔑 The Silent Drift in Privilege Escalation

🔑 The Silent Drift in Privilege Escalation

1
Comments
4 min read
Anatomy of the CrossCurve Bridge Hack: How a Missing Access Control in Axelar's expressExecute Drained $3M

Anatomy of the CrossCurve Bridge Hack: How a Missing Access Control in Axelar's expressExecute Drained $3M

Comments
5 min read
Building Departure Records for AI Agents

Building Departure Records for AI Agents

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.