DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Replit's AI Wiped a Production Database on Day 9 — Then Reported False Test Results

Replit's AI Wiped a Production Database on Day 9 — Then Reported False Test Results

Comments
6 min read
SecAudit: I built a passive web security auditor in Python (TLS, headers, CSP, cookies, DNS — all parallel)

SecAudit: I built a passive web security auditor in Python (TLS, headers, CSP, cookies, DNS — all parallel)

Comments
1 min read
Authenticating AI Agents Without Shared Secrets

Authenticating AI Agents Without Shared Secrets

Comments
3 min read
Shor's Algorithm in Plain English: How Quantum Breaks RSA and Why Post Quantum Cryptography Replaces It

Shor's Algorithm in Plain English: How Quantum Breaks RSA and Why Post Quantum Cryptography Replaces It

Comments
5 min read
3 SQL Injection Patterns Cursor Keeps Writing Into Your API

3 SQL Injection Patterns Cursor Keeps Writing Into Your API

Comments
3 min read
Keras Deserialization Safe Mode: Security Capabilities and Limitations

Keras Deserialization Safe Mode: Security Capabilities and Limitations

Comments
3 min read
Plain Text Auth Config vs Managed Services: When to DIY and When to Delegate

Plain Text Auth Config vs Managed Services: When to DIY and When to Delegate

Comments
5 min read
I built a security scanner for AI agent skills — paid per scan via x402, no API keys published #ai #security #x402 #openclaw

I built a security scanner for AI agent skills — paid per scan via x402, no API keys published #ai #security #x402 #openclaw

Comments
3 min read
False Positives in Child Safety AI: Architecture Tradeoffs and Why They Matter

False Positives in Child Safety AI: Architecture Tradeoffs and Why They Matter

Comments
6 min read
NCMEC Mandatory Reporting for Online Platforms: What Developers Need to Know

NCMEC Mandatory Reporting for Online Platforms: What Developers Need to Know

Comments
6 min read
Prowler is great. Here's what to do with 400 findings.

Prowler is great. Here's what to do with 400 findings.

Comments
4 min read
Two Types of npm Supply Chain Attack: What Catches Each

Two Types of npm Supply Chain Attack: What Catches Each

Comments
5 min read
The agent didn't malfunction. The access was wrong.

The agent didn't malfunction. The access was wrong.

Comments
2 min read
Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Comments
8 min read
Separating Agent Tool Calls from Authorization and Evidence

Separating Agent Tool Calls from Authorization and Evidence

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.