DEV Community

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The 26-Dimensional Feature Vector: How a Machine Learns to Recognise a Secret

The 26-Dimensional Feature Vector: How a Machine Learns to Recognise a Secret

Comments
9 min read
Why the Variable Name Is the Most Important Feature in Secrets Detection

Why the Variable Name Is the Most Important Feature in Secrets Detection

Comments
8 min read
We scanned 50+ MCP servers and found HIGH-severity bugs in Atlassian, GitHub, Cloudflare, and Microsoft — here's what we learned

We scanned 50+ MCP servers and found HIGH-severity bugs in Atlassian, GitHub, Cloudflare, and Microsoft — here's what we learned

1
Comments 1
4 min read
AI-Powered Security Code Reviews That Actually Work: A Threat-Model-First Methodology

AI-Powered Security Code Reviews That Actually Work: A Threat-Model-First Methodology

Comments
9 min read
What a Free Security Snapshot Can Tell You — and What It Cannot

What a Free Security Snapshot Can Tell You — and What It Cannot

Comments
4 min read
Your MCP dependency scan can pass and still miss HIGH vulnerabilities

Your MCP dependency scan can pass and still miss HIGH vulnerabilities

1
Comments 1
3 min read
Why I Built an ML-Powered Secrets Detector Instead of Just Using Regex

Why I Built an ML-Powered Secrets Detector Instead of Just Using Regex

Comments
8 min read
What Building a SAST Tool Taught Me About AppSec That 13 Years of Software Engineering Didn't

What Building a SAST Tool Taught Me About AppSec That 13 Years of Software Engineering Didn't

Comments
8 min read
Your Private API is Currently Safe. One Developer Change Away From Unsafe.

Your Private API is Currently Safe. One Developer Change Away From Unsafe.

Comments
8 min read
False Positives in SAST — How I Built Suppression Into My Scanner and Why It Matters

False Positives in SAST — How I Built Suppression Into My Scanner and Why It Matters

Comments
9 min read
Writing Custom SAST Rules for Vulnerabilities Your Scanner Doesn't Cover

Writing Custom SAST Rules for Vulnerabilities Your Scanner Doesn't Cover

Comments
8 min read
How I Modelled the OWASP Top 10 Into a YAML Rule Engine

How I Modelled the OWASP Top 10 Into a YAML Rule Engine

Comments
8 min read
Introducing a OWASP Game for threat modeling Agentic AI, Cloud, Devops, Frontend, LLM, Automation, and Web

Introducing a OWASP Game for threat modeling Agentic AI, Cloud, Devops, Frontend, LLM, Automation, and Web

1
Comments 1
10 min read
SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

Comments
10 min read
From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement

From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement

Comments
13 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.