DEV Community

# vulnerabilities

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Audit Your AI Agent Skills for Credential Exposure and Malicious Instructions

How to Audit Your AI Agent Skills for Credential Exposure and Malicious Instructions

1
Comments 1
3 min read
What "Code That Runs Before You Click Trust" Means for AI Coding Tools (Claude Code Case Study)

What "Code That Runs Before You Click Trust" Means for AI Coding Tools (Claude Code Case Study)

Comments
4 min read
How to Check if You're Affected by CVE-2026-26268 in Cursor (and What to Do)

How to Check if You're Affected by CVE-2026-26268 in Cursor (and What to Do)

Comments
3 min read
How to Check If Your Claude Code Installation Is Affected by CVE-2026-39861 (CVSS 7.7)

How to Check If Your Claude Code Installation Is Affected by CVE-2026-39861 (CVSS 7.7)

Comments
3 min read
Why Fixed Container Image Versions Matter: Lessons from the Trivy Supply Chain Attack

Why Fixed Container Image Versions Matter: Lessons from the Trivy Supply Chain Attack

1
Comments
15 min read
Stop triaging Go CVEs that don't affect you

Stop triaging Go CVEs that don't affect you

Comments
1 min read
Handling Dirty Frag and Copy Fail with Puppet

Handling Dirty Frag and Copy Fail with Puppet

1
Comments
7 min read
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners

From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners

Comments
3 min read
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)

How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)

Comments
3 min read
Learning Progress Pt.7

Learning Progress Pt.7

Comments
1 min read
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time

Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time

Comments
5 min read
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack

CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack

Comments
3 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack

Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack

5
Comments
6 min read
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)

The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)

Comments
6 min read
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws

LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.