DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Day 5: C Strings: The Danger of the Null Terminator (\0)

Day 5: C Strings: The Danger of the Null Terminator (\0)

Comments 1
1 min read
Why AI Agents Break Traditional Security Models: A Practical Introduction to the New Threat Landscape

Why AI Agents Break Traditional Security Models: A Practical Introduction to the New Threat Landscape

Comments
6 min read
Chifleton — An Open-Source Dependency Vulnerability Scanner

Chifleton — An Open-Source Dependency Vulnerability Scanner

Comments
2 min read
Official AI Sandboxes Arrived — Why I Published Mine Anyway

Official AI Sandboxes Arrived — Why I Published Mine Anyway

1
Comments
7 min read
Most “Private” Apps Still Leak More Than You Think

Most “Private” Apps Still Leak More Than You Think

Comments
2 min read
Janee Setup Guide: Secure API Key Management for OpenClaw, Claude, and Other AI Agents

Janee Setup Guide: Secure API Key Management for OpenClaw, Claude, and Other AI Agents

1
Comments
5 min read
The Future of IaC Security: Scanning, Drift Detection and Autoremediation

The Future of IaC Security: Scanning, Drift Detection and Autoremediation

Comments
6 min read
The Hidden Cost of Cloud Misconfigurations (It’s Not Just Your Bill)

The Hidden Cost of Cloud Misconfigurations (It’s Not Just Your Bill)

Comments
3 min read
I built a cryptographic memory layer for humans in Python tags: python, opensource, security, blockchain

I built a cryptographic memory layer for humans in Python tags: python, opensource, security, blockchain

3
Comments 11
4 min read
Elevate Your Code Reviews: Moving Beyond Bug Hunting

Elevate Your Code Reviews: Moving Beyond Bug Hunting

5
Comments
2 min read
Defend your app: 10 modern best practices for securing Web Applications

Defend your app: 10 modern best practices for securing Web Applications

Comments
5 min read
How to protect server functions with auth middleware in TanStack Start

How to protect server functions with auth middleware in TanStack Start

2
Comments 1
3 min read
Built a Python Dependency Audit Tool Because Vulnerability Lists Weren’t Enough

Built a Python Dependency Audit Tool Because Vulnerability Lists Weren’t Enough

1
Comments
2 min read
Logging Into EC2 Is Easy… Until You Pick the Wrong Way

Logging Into EC2 Is Easy… Until You Pick the Wrong Way

1
Comments 1
3 min read
Building a Fail-Closed Investment Risk Gate with Yuer DSL

Building a Fail-Closed Investment Risk Gate with Yuer DSL

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.