Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 23
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners
#
security
#
appsec
#
vulnerabilities
#
devops
Comments
Add Comment
3 min read
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)
Armor1
Armor1
Armor1
Follow
Apr 22
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)
#
mcp
#
security
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 21
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
5 min read
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
Armor1
Armor1
Armor1
Follow
Apr 16
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
#
security
#
python
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
Excalibra
Excalibra
Excalibra
Follow
Apr 13
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
#
malware
#
vulnerabilities
#
redteam
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
Calin V.
Calin V.
Calin V.
Follow
Apr 9
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
#
security
#
wordpress
#
cybersecurity
#
vulnerabilities
Comments
Add Comment
6 min read
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 8
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
#
llms
#
security
#
vulnerabilities
#
formalverification
Comments
Add Comment
10 min read
CVE-2026-21852: How enableAllProjectMcpServers Leaks Your Entire Source Code
Sattyam Jain
Sattyam Jain
Sattyam Jain
Follow
Apr 7
CVE-2026-21852: How enableAllProjectMcpServers Leaks Your Entire Source Code
#
ai
#
aiops
#
vulnerabilities
Comments
Add Comment
3 min read
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 20
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
4 min read
Vulnerabities are being exploited faster than ever: opportunity in disguise
Mikail Kocak
Mikail Kocak
Mikail Kocak
Follow
Apr 7
Vulnerabities are being exploited faster than ever: opportunity in disguise
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
2 min read
Ambiguous MCP Instructions Enable Unauthorized AI Actions: Enhanced Validation and Oversight Proposed
Olga Larionova
Olga Larionova
Olga Larionova
Follow
Apr 2
Ambiguous MCP Instructions Enable Unauthorized AI Actions: Enhanced Validation and Oversight Proposed
#
ai
#
security
#
ambiguity
#
vulnerabilities
Comments
Add Comment
10 min read
Mongoose Library Flaws Expose Devices to RCE and mTLS Bypass: Update to Version 7.21+ to Mitigate Risks
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 2
Mongoose Library Flaws Expose Devices to RCE and mTLS Bypass: Update to Version 7.21+ to Mitigate Risks
#
iot
#
rce
#
mtls
#
vulnerabilities
Comments
Add Comment
6 min read
I Asked My AI Agent About axios. It Knew Everything in 0.03ms.
Mr. 0x1
Mr. 0x1
Mr. 0x1
Follow
Apr 5
I Asked My AI Agent About axios. It Knew Everything in 0.03ms.
#
security
#
mcp
#
ai
#
vulnerabilities
1
 reaction
Comments
Add Comment
4 min read
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem
Maxim Gerasimov
Maxim Gerasimov
Maxim Gerasimov
Follow
Apr 1
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem
#
security
#
dependencies
#
npm
#
vulnerabilities
Comments
Add Comment
8 min read
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 31
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks
#
security
#
authentication
#
vulnerabilities
#
mcp
Comments
Add Comment
9 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account