Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What Claude Code's Leaked Source Reveals About AI Agent Governance
Cover image for What Claude Code's Leaked Source Reveals About AI Agent Governance

What Claude Code's Leaked Source Reveals About AI Agent Governance

Comments
3 min read
X25519 vs RSA for Email Encryption: Practical Benchmarks in 2026

X25519 vs RSA for Email Encryption: Practical Benchmarks in 2026

Comments 2
1 min read
axios Got Hijacked Today: A Technical Breakdown of the Most Sophisticated npm Supply Chain Attack Yet
Cover image for axios Got Hijacked Today: A Technical Breakdown of the Most Sophisticated npm Supply Chain Attack Yet

axios Got Hijacked Today: A Technical Breakdown of the Most Sophisticated npm Supply Chain Attack Yet

Comments
5 min read
Preventing Agent Hijacking With Cryptographic Identity and RBAC

Preventing Agent Hijacking With Cryptographic Identity and RBAC

Comments
6 min read
The Hidden Cost of SaaS Free Trial Abuse (And How to Detect It)

The Hidden Cost of SaaS Free Trial Abuse (And How to Detect It)

Comments
1 min read
How to Protect JavaScript Projects Against Supply Chain Attacks

How to Protect JavaScript Projects Against Supply Chain Attacks

Comments
2 min read
HBR Says AI Agents Act Like Malware. Here's What To Do About It.

HBR Says AI Agents Act Like Malware. Here's What To Do About It.

Comments
3 min read
3 Broken Auth Bugs Cursor Keeps Writing Into JWT Code
Cover image for 3 Broken Auth Bugs Cursor Keeps Writing Into JWT Code

3 Broken Auth Bugs Cursor Keeps Writing Into JWT Code

Comments
4 min read
what if MCP servers had a Lighthouse-style security score?

what if MCP servers had a Lighthouse-style security score?

1
Comments
2 min read
Security by Default: The Case for Local Code Execution

Security by Default: The Case for Local Code Execution

Comments
3 min read
AI Agent Traps: How Websites Detect and Manipulate AI Agents
Cover image for AI Agent Traps: How Websites Detect and Manipulate AI Agents

AI Agent Traps: How Websites Detect and Manipulate AI Agents

Comments
4 min read
Most Dockerfile Security Scans Stop at Detection — Here’s What Happens Next
Cover image for Most Dockerfile Security Scans Stop at Detection — Here’s What Happens Next

Most Dockerfile Security Scans Stop at Detection — Here’s What Happens Next

Comments
2 min read
Software Supply Chain Attacks: Why Your Dependencies Are Your Biggest Vulnerability
Cover image for Software Supply Chain Attacks: Why Your Dependencies Are Your Biggest Vulnerability

Software Supply Chain Attacks: Why Your Dependencies Are Your Biggest Vulnerability

Comments
5 min read
Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Comments
2 min read
How to let AI code with your real API keys (without leaking them)
Cover image for How to let AI code with your real API keys (without leaking them)

How to let AI code with your real API keys (without leaking them)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.