DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Managing and Securing Environment Variables (.env): A Look at evnx

Managing and Securing Environment Variables (.env): A Look at evnx

Comments 2
6 min read
LmCompatibilityLevel 5 Fails to Block NTLMv1 Due to MS-NRPC ParameterControl Flag Bypass

LmCompatibilityLevel 5 Fails to Block NTLMv1 Due to MS-NRPC ParameterControl Flag Bypass

Comments
9 min read
5 Nginx Log Patterns Every SaaS Developer Should Monitor

5 Nginx Log Patterns Every SaaS Developer Should Monitor

1
Comments
3 min read
Claude AI Source Code Leaked: Individual Rewriting in Rust to Address Security Concerns

Claude AI Source Code Leaked: Individual Rewriting in Rust to Address Security Concerns

Comments
8 min read
What is a Cryptographic Audit Trail — and Why AI Agents Need One

What is a Cryptographic Audit Trail — and Why AI Agents Need One

Comments
2 min read
EU AI Act Compliance Will Fail Without an AI System Inventory. Here's How to Build One.

EU AI Act Compliance Will Fail Without an AI System Inventory. Here's How to Build One.

Comments
8 min read
Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Comments
11 min read
Blind `npm install` Execution Risks Security Vulnerabilities: Review Lockfiles to Mitigate Threats

Blind `npm install` Execution Risks Security Vulnerabilities: Review Lockfiles to Mitigate Threats

Comments
10 min read
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

Comments
4 min read
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem

Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem

Comments
8 min read
كيفية تأمين تبعيات NPM: دليل شامل لأمن سلسلة التوريد لمطوري API

كيفية تأمين تبعيات NPM: دليل شامل لأمن سلسلة التوريد لمطوري API

Comments
4 min read
Your Agent Monitoring SDK Was the Backdoor

Your Agent Monitoring SDK Was the Backdoor

Comments
10 min read
chapter 2 : structure of JWT

chapter 2 : structure of JWT

Comments
1 min read
Axios NPM Supply Chain Angriff: API Projekte schützen

Axios NPM Supply Chain Angriff: API Projekte schützen

Comments
8 min read
Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Comments
9 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.