DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The 5-Layer Security Model Every AI Agent Needs in Production

The 5-Layer Security Model Every AI Agent Needs in Production

Comments
10 min read
How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

1
Comments
5 min read
Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Comments
5 min read
Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Comments
3 min read
194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

Comments
1 min read
Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Comments
7 min read
Second-Order Injection: Attacking the Evaluator in LLM Safety Monitors

Second-Order Injection: Attacking the Evaluator in LLM Safety Monitors

1
Comments
14 min read
⚠️ Race Conditions in APIs - The Bug You Can’t See

⚠️ Race Conditions in APIs - The Bug You Can’t See

1
Comments
5 min read
Argon2id Master Passwords: Securing Your Self-Hosted AI Agent Wallet

Argon2id Master Passwords: Securing Your Self-Hosted AI Agent Wallet

Comments
5 min read
Windows Zero-Days, Recall Bypasses, RDP Exfiltration: Key Security Threats

Windows Zero-Days, Recall Bypasses, RDP Exfiltration: Key Security Threats

Comments
4 min read
The Cloud Security Checklist I Use at Every Enterprise Engagement

The Cloud Security Checklist I Use at Every Enterprise Engagement

Comments
2 min read
IDOR in AI-Generated Code: What Cursor Won't Check for You

IDOR in AI-Generated Code: What Cursor Won't Check for You

1
Comments
2 min read
GhostLine — Real-Time Encrypted Chat (No Signup Required)

GhostLine — Real-Time Encrypted Chat (No Signup Required)

2
Comments
1 min read
I Ran a Subdomain Takeover Checker on GitHub.com and Found a Vulnerable Subdomain

I Ran a Subdomain Takeover Checker on GitHub.com and Found a Vulnerable Subdomain

2
Comments
2 min read
$60K Billed in 13 Hours: Why Leaked Firebase Keys Keep Killing AI-Built Apps

$60K Billed in 13 Hours: Why Leaked Firebase Keys Keep Killing AI-Built Apps

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.