Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Audit Your AI Agent Skills for Credential Exposure and Malicious Instructions
Armor1
Armor1
Armor1
Follow
May 15
How to Audit Your AI Agent Skills for Credential Exposure and Malicious Instructions
#
mcp
#
security
#
ai
#
vulnerabilities
1
 reaction
Comments
1
 comment
3 min read
What "Code That Runs Before You Click Trust" Means for AI Coding Tools (Claude Code Case Study)
Armor1
Armor1
Armor1
Follow
May 12
What "Code That Runs Before You Click Trust" Means for AI Coding Tools (Claude Code Case Study)
#
mcp
#
security
#
ai
#
vulnerabilities
Comments
Add Comment
4 min read
How to Check if You're Affected by CVE-2026-26268 in Cursor (and What to Do)
Armor1
Armor1
Armor1
Follow
May 10
How to Check if You're Affected by CVE-2026-26268 in Cursor (and What to Do)
#
mcp
#
security
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
How to Check If Your Claude Code Installation Is Affected by CVE-2026-39861 (CVSS 7.7)
Armor1
Armor1
Armor1
Follow
May 8
How to Check If Your Claude Code Installation Is Affected by CVE-2026-39861 (CVSS 7.7)
#
security
#
claudecode
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Why Fixed Container Image Versions Matter: Lessons from the Trivy Supply Chain Attack
Nikolay Kuziev
Nikolay Kuziev
Nikolay Kuziev
Follow
May 7
Why Fixed Container Image Versions Matter: Lessons from the Trivy Supply Chain Attack
#
security
#
cicd
#
docker
#
vulnerabilities
1
 reaction
Comments
Add Comment
15 min read
Stop triaging Go CVEs that don't affect you
Vinu K
Vinu K
Vinu K
Follow
May 5
Stop triaging Go CVEs that don't affect you
#
go
#
security
#
opensource
#
vulnerabilities
Comments
Add Comment
1 min read
Handling Dirty Frag and Copy Fail with Puppet
Tony Green
Tony Green
Tony Green
Follow
for
puppet
May 13
Handling Dirty Frag and Copy Fail with Puppet
#
puppet
#
vulnerabilities
#
automation
#
devops
1
 reaction
Comments
Add Comment
7 min read
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 23
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners
#
security
#
appsec
#
vulnerabilities
#
devops
Comments
Add Comment
3 min read
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)
Armor1
Armor1
Armor1
Follow
Apr 22
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)
#
mcp
#
security
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Learning Progress Pt.7
Muhamed Maxhuni
Muhamed Maxhuni
Muhamed Maxhuni
Follow
May 12
Learning Progress Pt.7
#
cybersecurity
#
vulnerabilities
#
javascript
#
productivity
Comments
Add Comment
1 min read
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 21
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
5 min read
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
Armor1
Armor1
Armor1
Follow
Apr 16
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
#
security
#
python
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
Excalibra
Excalibra
Excalibra
Follow
Apr 13
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
#
malware
#
vulnerabilities
#
redteam
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
Calin V.
Calin V.
Calin V.
Follow
Apr 9
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
#
security
#
wordpress
#
cybersecurity
#
vulnerabilities
Comments
Add Comment
6 min read
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 8
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
#
llms
#
security
#
vulnerabilities
#
formalverification
Comments
Add Comment
10 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account