DEV Community

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program

Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program

Comments
4 min read
Execute First, Ask Never: A Vulnerability in snyk-agent-scan

Execute First, Ask Never: A Vulnerability in snyk-agent-scan

2
Comments
8 min read
Why your SBOM is lying to you: Rethinking OWASP A03 for 2026

Why your SBOM is lying to you: Rethinking OWASP A03 for 2026

Comments
3 min read
From Alert Lists to Exploit Graphs: How Auditor Core Changes the Security Calculus

From Alert Lists to Exploit Graphs: How Auditor Core Changes the Security Calculus

Comments
5 min read
Subdomain Takeover is Not Just Phishing: How Acronis Nearly Lost Authenticated API Access

Subdomain Takeover is Not Just Phishing: How Acronis Nearly Lost Authenticated API Access

Comments
6 min read
The New Wave of Accessibility-Service Malware Explained

The New Wave of Accessibility-Service Malware Explained

1
Comments 1
1 min read
Why Device Binding Fails — And How Attackers Bypass It

Why Device Binding Fails — And How Attackers Bypass It

Comments
1 min read
NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

Comments
5 min read
A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

Comments
7 min read
Beyond the Chatbot: How Claude Code Is Turning Security Audits Into a One-Command Workflow

Beyond the Chatbot: How Claude Code Is Turning Security Audits Into a One-Command Workflow

Comments
4 min read
Why I built attack-chain correlation on top of Semgrep and Joern

Why I built attack-chain correlation on top of Semgrep and Joern

Comments
3 min read
LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure

LiteLLM Supply Chain Attack: How TeamPCP Backdoored AI Infrastructure

1
Comments
12 min read
Automated Security Audits With AI Agent Teams

Automated Security Audits With AI Agent Teams

Comments
2 min read
EU Cyber Resilience Act: What It Means for Your Codebase and How to Prepare

EU Cyber Resilience Act: What It Means for Your Codebase and How to Prepare

Comments
3 min read
Awareness, Not Safety Net: Set Correct Expectations

Awareness, Not Safety Net: Set Correct Expectations

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.