DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Is Cursor Safe? I Scanned 100 Apps. 67% Had Critical Vulns.

Is Cursor Safe? I Scanned 100 Apps. 67% Had Critical Vulns.

2
Comments 3
5 min read
Semgrep Observability with OpenTelemetry

Semgrep Observability with OpenTelemetry

Comments
4 min read
I Analyzed All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

I Analyzed All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

2
Comments
24 min read
Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Comments
11 min read
The Axios Attack Proved Vibe Coding's Biggest Blind Spot

The Axios Attack Proved Vibe Coding's Biggest Blind Spot

Comments
6 min read
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

Comments
4 min read
Your Agent Monitoring SDK Was the Backdoor

Your Agent Monitoring SDK Was the Backdoor

Comments
10 min read
Security Is a Myth | The Axios Supply Chain Attack

Security Is a Myth | The Axios Supply Chain Attack

Comments
5 min read
Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Comments
3 min read
Claude Code source map leaks are a wake-up call — here's how to monitor agent vulnerabilities

Claude Code source map leaks are a wake-up call — here's how to monitor agent vulnerabilities

Comments
4 min read
The Zero Privilege Paradigm: Definitive Guide to Immutable Security

The Zero Privilege Paradigm: Definitive Guide to Immutable Security

Comments
4 min read
I mapped all 84 MITRE ATLAS techniques to AI agent detection rules — here's what I found

I mapped all 84 MITRE ATLAS techniques to AI agent detection rules — here's what I found

Comments
1 min read
Persona Persistence Attacks: When Your AI Agent's Soul File Becomes a Backdoor

Persona Persistence Attacks: When Your AI Agent's Soul File Becomes a Backdoor

Comments
2 min read
I Tested 6 Attacks on Multi-Agent Systems — Here's Which Ones Agents Can't See

I Tested 6 Attacks on Multi-Agent Systems — Here's Which Ones Agents Can't See

Comments
4 min read
I analyzed 250,000 attacks on my Linux servers. Here's what I found.

I analyzed 250,000 attacks on my Linux servers. Here's what I found.

1
Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.