DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Challenging Assumptions in Technology: From Being Right to Getting It Right

Challenging Assumptions in Technology: From Being Right to Getting It Right

Comments
7 min read
CVE-2026-25990: Pillow Fight: Weaponizing Photoshop Files via OOB Writes

CVE-2026-25990: Pillow Fight: Weaponizing Photoshop Files via OOB Writes

Comments
2 min read
The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring

The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring

3
Comments
6 min read
The Case of the Empty 500: How I Proved the API Failure Wasn't Our Fault

The Case of the Empty 500: How I Proved the API Failure Wasn't Our Fault

Comments
2 min read
Next.js JWT Authentication: Complete Guide to Secure Your App in 2026

Next.js JWT Authentication: Complete Guide to Secure Your App in 2026

2
Comments
15 min read
The AI Orchestrator: Governing Autonomous Systems

The AI Orchestrator: Governing Autonomous Systems

Comments
5 min read
How to Implement Just-In-Time SSH Access for AWS EC2 (Stop Leaving Port 22 Open!)

How to Implement Just-In-Time SSH Access for AWS EC2 (Stop Leaving Port 22 Open!)

Comments
5 min read
Your AI Agent's API Keys Are Probably in Plaintext Right Now

Your AI Agent's API Keys Are Probably in Plaintext Right Now

Comments
4 min read
Building a Python-Based Network Scanning Tool with Nmap as the Backend Engine

Building a Python-Based Network Scanning Tool with Nmap as the Backend Engine

Comments
4 min read
CVE-2026-25949: Traefik's Eternal Wait: Bypassing TCP Timeouts with Postgres Magic Bytes

CVE-2026-25949: Traefik's Eternal Wait: Bypassing TCP Timeouts with Postgres Magic Bytes

Comments
2 min read
Schema Drift: The Silent MCP Attack Vector Nobody's Watching

Schema Drift: The Silent MCP Attack Vector Nobody's Watching

Comments
3 min read
Shared Signals Framework: Bringing Standards to Continuous Session Protection

Shared Signals Framework: Bringing Standards to Continuous Session Protection

1
Comments
5 min read
How to Detect Vulnerable Technologies on Any Website Using CPE Identifiers

How to Detect Vulnerable Technologies on Any Website Using CPE Identifiers

Comments
3 min read
We Ranked 5 AI Models by Security. The Leaderboard Is Wrong.

We Ranked 5 AI Models by Security. The Leaderboard Is Wrong.

2
Comments
9 min read
Exports are a security boundary: the moment local-first becomes shareable

Exports are a security boundary: the moment local-first becomes shareable

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.