Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Meet StatlerScore, a Credit Score for your Cloud

Meet StatlerScore, a Credit Score for your Cloud

1
Comments
5 min read
Authorization Abuse Is the New Smart Contract Hack: Defending DeFi in the Phishing Era

Authorization Abuse Is the New Smart Contract Hack: Defending DeFi in the Phishing Era

1
Comments
5 min read
AIMomentz CAP-SRP: How We Built a Cryptographic Audit Trail for AI Image Refusals in ~8,000 Lines of PHP
Cover image for AIMomentz CAP-SRP: How We Built a Cryptographic Audit Trail for AI Image Refusals in ~8,000 Lines of PHP

AIMomentz CAP-SRP: How We Built a Cryptographic Audit Trail for AI Image Refusals in ~8,000 Lines of PHP

1
Comments
15 min read
Το Ταξίδι του JWT Όταν η Εμπιστοσύνη Γίνεται Token

Το Ταξίδι του JWT Όταν η Εμπιστοσύνη Γίνεται Token

Comments
1 min read
Securing Drupal Architectures at Scale: The 24-Hour SLA
Cover image for Securing Drupal Architectures at Scale: The 24-Hour SLA

Securing Drupal Architectures at Scale: The 24-Hour SLA

1
Comments
2 min read
Fragile Constraints: What Happens When AI Makes Rewriting Free

Fragile Constraints: What Happens When AI Makes Rewriting Free

1
Comments
7 min read
Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters
Cover image for Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters

Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters

4
Comments
4 min read
Linxr | Part 2 — Shipping QEMU in an APK

Linxr | Part 2 — Shipping QEMU in an APK

1
Comments
3 min read
Bringing Your Own Data into Microsoft 365 Copilot (Without Breaking Security)

Bringing Your Own Data into Microsoft 365 Copilot (Without Breaking Security)

Comments
7 min read
RAG Security 101: Protecting Your Retrieval-Augmented Generation Pipeline

RAG Security 101: Protecting Your Retrieval-Augmented Generation Pipeline

1
Comments
4 min read
Running code quality pipelines during AI coding workflows
Cover image for Running code quality pipelines during AI coding workflows

Running code quality pipelines during AI coding workflows

6
Comments
1 min read
Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows
Cover image for Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows

Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows

Comments
3 min read
Two reports this week should worry anyone running AI agents

Two reports this week should worry anyone running AI agents

1
Comments
3 min read
5 Ways to Debug JWT Tokens (Without Losing Your Mind)

5 Ways to Debug JWT Tokens (Without Losing Your Mind)

Comments
3 min read
Why Supply Chain Security Fails in the Real World

Why Supply Chain Security Fails in the Real World

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.