DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building EncroGram: A Messenger Where Servers Can't Read Your Messages

Building EncroGram: A Messenger Where Servers Can't Read Your Messages

Comments
2 min read
MCP vs CLI Tools: Which is best for production applications?

MCP vs CLI Tools: Which is best for production applications?

Comments 1
6 min read
CVE-2026-24688: Ouroboros in the Outline: Infinite Loops in pypdf (CVE-2026-24688)

CVE-2026-24688: Ouroboros in the Outline: Infinite Loops in pypdf (CVE-2026-24688)

Comments
2 min read
Securing AI Skills

Securing AI Skills

9
Comments
5 min read
Engineering Log: Ralph Proactive Scan Findings (+2 more)

Engineering Log: Ralph Proactive Scan Findings (+2 more)

1
Comments
1 min read
A LinkedIn Job Offer Tried to Install Malware on My Machine

A LinkedIn Job Offer Tried to Install Malware on My Machine

Comments
8 min read
CVE-2026-24490: MobSF Stored XSS: When the Scanner Becomes the Target

CVE-2026-24490: MobSF Stored XSS: When the Scanner Becomes the Target

Comments
2 min read
CVE-2026-24686: TUF Luck: Escaping the Sandbox in go-tuf via TAP 4 Map Files

CVE-2026-24686: TUF Luck: Escaping the Sandbox in go-tuf via TAP 4 Map Files

Comments
2 min read
Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes

Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes

Comments
13 min read
tokenex adds Vault & OpenBao support: Exchanging ID tokens (JWTs) for secrets without static credentials

tokenex adds Vault & OpenBao support: Exchanging ID tokens (JWTs) for secrets without static credentials

Comments
10 min read
Clawdbot...

Clawdbot...

Comments
1 min read
5 Essential Security Headers for Modern Frontend Devs (Next.js, Angular, & Vue)

5 Essential Security Headers for Modern Frontend Devs (Next.js, Angular, & Vue)

Comments
6 min read
Redesigning a Protocol for AI Agents That Interact With the Real World

Redesigning a Protocol for AI Agents That Interact With the Real World

Comments
3 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Comments
5 min read
I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

Comments
1 min read
File Permission on unix Systems

File Permission on unix Systems

Comments
6 min read
We got tired of users asking "is this file legit?" so we built a verification system

We got tired of users asking "is this file legit?" so we built a verification system

Comments
2 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Comments
2 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
Configuring Microsoft Defender for Cloud for Enhanced Protection

Configuring Microsoft Defender for Cloud for Enhanced Protection

Comments
1 min read
Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Comments
9 min read
I built what browsers refused to ship: SRI for fetch()

I built what browsers refused to ship: SRI for fetch()

Comments
2 min read
Modular Isolation Architecture (MIA)

Modular Isolation Architecture (MIA)

Comments
2 min read
Corporate Wargames: Red Teams vs Blue Teams

Corporate Wargames: Red Teams vs Blue Teams

1
Comments
3 min read
loading...