DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Human Vulnerability Models in Scam Design

Understanding Human Vulnerability Models in Scam Design

Comments
10 min read
I tried to hack my local AI agent with Prompt Injection. It laughed at me.

I tried to hack my local AI agent with Prompt Injection. It laughed at me.

Comments
4 min read
Air Traffic Control Scaleway Ep.1

Air Traffic Control Scaleway Ep.1

6
Comments
9 min read
A free GitHub Action that fails CI on leaked Solana wallet keys — how I built and shipped cipher-solana-wallet-audit

A free GitHub Action that fails CI on leaked Solana wallet keys — how I built and shipped cipher-solana-wallet-audit

Comments
10 min read
The Blindfold That Sees

The Blindfold That Sees

Comments
6 min read
Why Cursor Keeps Writing Prototype Pollution Into Your JS

Why Cursor Keeps Writing Prototype Pollution Into Your JS

Comments
2 min read
blockchain compliance that runs before the transaction settles

blockchain compliance that runs before the transaction settles

Comments
1 min read
GPTBot follows content invisible to humans. TwitterBot and ClaudeBot don t.

GPTBot follows content invisible to humans. TwitterBot and ClaudeBot don t.

Comments
2 min read
Show HN: veez-pii-guard – anonymize PII before LLM calls, pure Go, offline, 0.019ms

Show HN: veez-pii-guard – anonymize PII before LLM calls, pure Go, offline, 0.019ms

Comments 2
1 min read
OAuth vs. API Keys for Agentic AI

OAuth vs. API Keys for Agentic AI

5
Comments
14 min read
The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

The User With No Face: Why Modern Technology Is Becoming More Dangerous From the Inside

Comments
7 min read
Securing Starknet: Fixing Gas DoS & Logic Flaws with AI-Assisted Auditing

Securing Starknet: Fixing Gas DoS & Logic Flaws with AI-Assisted Auditing

Comments
2 min read
Building an AI-Powered Detection System with Hindsight Memory Integration

Building an AI-Powered Detection System with Hindsight Memory Integration

Comments
4 min read
Shield: AI detection system

Shield: AI detection system

Comments
4 min read
Understanding Continuous Access Evaluation Protocol (CAEP)

Understanding Continuous Access Evaluation Protocol (CAEP)

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.