close

DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
GitHub Copilot Will Train on Your Code Context. Here's What That Means for Your API Keys.

GitHub Copilot Will Train on Your Code Context. Here's What That Means for Your API Keys.

Comments
4 min read
Why Cursor Keeps Writing Wildcard CORS (And Why It Matters)

Why Cursor Keeps Writing Wildcard CORS (And Why It Matters)

Comments
3 min read
TLS in Node.js Is a Black Box - Here's an Open One

TLS in Node.js Is a Black Box - Here's an Open One

Comments
9 min read
I let my AI agent read a file. It tried to leak my credentials.

I let my AI agent read a file. It tried to leak my credentials.

Image 1
Comments
4 min read
AWS This Week: Claude Mythos Is a Cybersecurity Model, Agent Registry Supports MCP, and More

AWS This Week: Claude Mythos Is a Cybersecurity Model, Agent Registry Supports MCP, and More

Image Image Image 8
Comments
3 min read
I ran 5 social engineering attacks on AI. The failure modes are human.

I ran 5 social engineering attacks on AI. The failure modes are human.

Image 1
Comments
2 min read
5.4-Cyber and the Death of the Static CI/CD Pipeline

5.4-Cyber and the Death of the Static CI/CD Pipeline

Comments
2 min read
I watched 145 bots visit my site for two weeks. Here is what I learned.

I watched 145 bots visit my site for two weeks. Here is what I learned.

Comments
4 min read
I watched 145 bots visit my site for two weeks. Here is what I learned.

I watched 145 bots visit my site for two weeks. Here is what I learned.

Comments
4 min read
Claude Now Wants Your Passport: What Developers Need to Know About Anthropic's Identity Verification

Claude Now Wants Your Passport: What Developers Need to Know About Anthropic's Identity Verification

Comments
3 min read
AgentGraph Update

AgentGraph Update

Comments
1 min read
Zero Day SharePoint Server Spoofing via Improper Input Validation

Zero Day SharePoint Server Spoofing via Improper Input Validation

Comments
4 min read
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack

CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack

Comments
3 min read
Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Comments
9 min read
Four Security Bugs That Shipped in AI-Generated Code (and How They Got Caught)

Four Security Bugs That Shipped in AI-Generated Code (and How They Got Caught)

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.