Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Comments
2 min read
How to let AI code with your real API keys (without leaking them)
Cover image for How to let AI code with your real API keys (without leaking them)

How to let AI code with your real API keys (without leaking them)

Comments
2 min read
Proving an MCP Tool Call Happened: A Complete Walkthrough

Proving an MCP Tool Call Happened: A Complete Walkthrough

1
Comments
5 min read
API Security Best Practices: A Practical Guide for IT Leaders

API Security Best Practices: A Practical Guide for IT Leaders

Comments
4 min read
Let's Encrypt

Let's Encrypt

1
Comments
2 min read
1Password & Dotenvx Tool
Cover image for 1Password & Dotenvx Tool

1Password & Dotenvx Tool

Comments
1 min read
What Do You Depend On? When the Chain of Trust Breaks
Cover image for What Do You Depend On? When the Chain of Trust Breaks

What Do You Depend On? When the Chain of Trust Breaks

Comments
3 min read
Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Comments
5 min read
One security alert changed how I think about dependencies
Cover image for One security alert changed how I think about dependencies

One security alert changed how I think about dependencies

1
Comments
2 min read
Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026
Cover image for Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026

Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026

1
Comments 1
4 min read
ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file
Cover image for ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file

ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file

Comments
3 min read
Your npm Package Is Leaking Source Code (And You Probably Don't Know It)
Cover image for Your npm Package Is Leaking Source Code (And You Probably Don't Know It)

Your npm Package Is Leaking Source Code (And You Probably Don't Know It)

Comments
4 min read
Anthropic's Accidental Release of Claude Code's Source Code: Irretrievable and Publicly Accessible

Anthropic's Accidental Release of Claude Code's Source Code: Irretrievable and Publicly Accessible

Comments
14 min read
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Comments
9 min read
Claude Mythos Leak: Why Cybersec Pros + Tech Workers Should Be Nervous Right Now 😰

Claude Mythos Leak: Why Cybersec Pros + Tech Workers Should Be Nervous Right Now 😰

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.