DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware

Multi-Vector Attack Convergence: Outlook, Zero-Days & AI Malware

Comments
5 min read
When Your AI Reads the Internet, It Inherits the Internet’s Threat Model

When Your AI Reads the Internet, It Inherits the Internet’s Threat Model

Comments
6 min read
I Built an Open-Source Security Scanner for AI Agents — Here's What I Found Scanning My Own

I Built an Open-Source Security Scanner for AI Agents — Here's What I Found Scanning My Own

Comments
3 min read
Stop Wrestling with OpenSSL: Generate JWKS in Seconds via Browser 🔑

Stop Wrestling with OpenSSL: Generate JWKS in Seconds via Browser 🔑

Comments
1 min read
Trust No One: Implementing True End-to-End Encryption with Insertable Streams

Trust No One: Implementing True End-to-End Encryption with Insertable Streams

2
Comments
8 min read
How to Integrate Vulnerability Scanning Into DevSecOps Workflows

How to Integrate Vulnerability Scanning Into DevSecOps Workflows

Comments
7 min read
Making Amazon Bedrock AgentCore Gateway Accessible (Only Through CloudFront)

Making Amazon Bedrock AgentCore Gateway Accessible (Only Through CloudFront)

1
Comments
4 min read
Why I Built a Privacy-First Image Converter (PNG, JPG, WebP, HEIC, AVIF) That Processes Files in the Browser

Why I Built a Privacy-First Image Converter (PNG, JPG, WebP, HEIC, AVIF) That Processes Files in the Browser

Comments
2 min read
Building Reliable Software: The Trap of Convenience

Building Reliable Software: The Trap of Convenience

Comments
7 min read
Running X11 apps inside a rootless Docker container (by passing xauth cookies)

Running X11 apps inside a rootless Docker container (by passing xauth cookies)

2
Comments
3 min read
Secure Code Execution Is Not Just Sandboxing — It’s System Design

Secure Code Execution Is Not Just Sandboxing — It’s System Design

Comments
2 min read
We Turned Off Dependabot. Our Codebase Is Healthier Than Ever.

We Turned Off Dependabot. Our Codebase Is Healthier Than Ever.

Comments
2 min read
Your Phone Already Has the Hardware to Prove a Photo Is Real. Nothing Uses It.

Your Phone Already Has the Hardware to Prove a Photo Is Real. Nothing Uses It.

Comments
3 min read
Why We Need Cryptographic Proof of What AI Refused to Generate: Building Verifiable Refusal Provenance with CAP-SRP

Why We Need Cryptographic Proof of What AI Refused to Generate: Building Verifiable Refusal Provenance with CAP-SRP

1
Comments
25 min read
Dispatch From the Other Side: From Scripts to Software

Dispatch From the Other Side: From Scripts to Software

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.