DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Analyzed $107K Jupiter Lend Before Contest Starts

How I Analyzed $107K Jupiter Lend Before Contest Starts

Comments
3 min read
When Your AI Becomes the Insider

When Your AI Becomes the Insider

Comments
3 min read
Securing Test Environments: Eliminating PII Leaks with Go

Securing Test Environments: Eliminating PII Leaks with Go

Comments
3 min read
How to Password-Protect dockurr/windows noVNC (Port 8006) Using Nginx Reverse Proxy

How to Password-Protect dockurr/windows noVNC (Port 8006) Using Nginx Reverse Proxy

Comments
2 min read
From Stored XSS to RCE | HackTheBox Imagery Writeup

From Stored XSS to RCE | HackTheBox Imagery Writeup

Comments
3 min read
Strategic QA Testing for Spam Trap Avoidance Without Documentation

Strategic QA Testing for Spam Trap Avoidance Without Documentation

Comments
3 min read
Overcoming Geo-Restrictions in Legacy React Applications: A Security Researcher's Guide

Overcoming Geo-Restrictions in Legacy React Applications: A Security Researcher's Guide

Comments
3 min read
CVE-2025-11953: React Native's Open Door Policy: The Anatomy of CVE-2025-11953

CVE-2025-11953: React Native's Open Door Policy: The Anatomy of CVE-2025-11953

Comments
2 min read
Authenticating GitHub Actions to AWS using IAM Roles

Authenticating GitHub Actions to AWS using IAM Roles

Comments
3 min read
Leveraging Rust to Prevent Bypassing Gated Content During High Traffic Events

Leveraging Rust to Prevent Bypassing Gated Content During High Traffic Events

Comments
2 min read
Microsoft's ESLint Security Plugin Catches 10% of Vulnerabilities. Here's What It Misses.

Microsoft's ESLint Security Plugin Catches 10% of Vulnerabilities. Here's What It Misses.

1
Comments
10 min read
SonarJS Has 269 Rules. It Still Misses 65% of Security Vulnerabilities.

SonarJS Has 269 Rules. It Still Misses 65% of Security Vulnerabilities.

Comments
12 min read
Build a "Military-Grade" Network Scanner in Python (Scapy Tutorial)

Build a "Military-Grade" Network Scanner in Python (Scapy Tutorial)

Comments
3 min read
Securing Legacy Test Environments: Eliminating PII Leaks on Linux

Securing Legacy Test Environments: Eliminating PII Leaks on Linux

Comments
3 min read
Building a Foundry PoC: A Step-by-Step Guide for Bug Bounty Hunters

Building a Foundry PoC: A Step-by-Step Guide for Bug Bounty Hunters

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.