Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Comments
8 min read
Why Cursor Keeps Writing Wildcard CORS (And Why It Matters)
Cover image for Why Cursor Keeps Writing Wildcard CORS (And Why It Matters)

Why Cursor Keeps Writing Wildcard CORS (And Why It Matters)

Comments
3 min read
A Scalable VPC Architecture

A Scalable VPC Architecture

Comments
4 min read
3 Prototype Pollution Bugs Cursor Keeps Writing Into Your Code

3 Prototype Pollution Bugs Cursor Keeps Writing Into Your Code

1
Comments 1
3 min read
Why Cursor Skips Auth Middleware on Every Route It Generates
Cover image for Why Cursor Skips Auth Middleware on Every Route It Generates

Why Cursor Skips Auth Middleware on Every Route It Generates

Comments
3 min read
Stop Treating Credential Generation as an Auditor Scramble
Cover image for Stop Treating Credential Generation as an Auditor Scramble

Stop Treating Credential Generation as an Auditor Scramble

Comments
3 min read
Building a Zero-Trust Golang Backend (Part 3): Deploying to GKE with Strict Security Context ☸️🚀
Cover image for Building a Zero-Trust Golang Backend (Part 3): Deploying to GKE with Strict Security Context ☸️🚀

Building a Zero-Trust Golang Backend (Part 3): Deploying to GKE with Strict Security Context ☸️🚀

Comments
2 min read
IDOR in AI-Generated Code: The Auth Bug Cursor Keeps Missing
Cover image for IDOR in AI-Generated Code: The Auth Bug Cursor Keeps Missing

IDOR in AI-Generated Code: The Auth Bug Cursor Keeps Missing

Comments
3 min read
Most security tools still use 20-year-old rules. That's why I built Permi.

Most security tools still use 20-year-old rules. That's why I built Permi.

Comments
1 min read
Building Friday: A Multi-Provider AI Agent That Lives in Your Terminal

Building Friday: A Multi-Provider AI Agent That Lives in Your Terminal

Comments
3 min read
When a Git Branch Name Becomes a Weapon: The Codex Command Injection That Could Steal Your GitHub Token

When a Git Branch Name Becomes a Weapon: The Codex Command Injection That Could Steal Your GitHub Token

Comments
6 min read
OWASP Top 10 for Agentic Applications 2026: What Every Claude Code User Needs to Know

OWASP Top 10 for Agentic Applications 2026: What Every Claude Code User Needs to Know

3
Comments 1
11 min read
Governing Security in the Age of Infinite Signal – From Discovery to Control

Governing Security in the Age of Infinite Signal – From Discovery to Control

Comments
7 min read
API Security in 2026: The Attack Surface Your Pentest Is Probably Missing
Cover image for API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

Comments
20 min read
API Security in 2026: The Attack Surface Your Pentest Is Probably Missing
Cover image for API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

Comments
20 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.