Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Axios Gets 100 Million Downloads a Week. Today, Two Came With a Trojan.
Cover image for Axios Gets 100 Million Downloads a Week. Today, Two Came With a Trojan.

Axios Gets 100 Million Downloads a Week. Today, Two Came With a Trojan.

1
Comments
2 min read
The Axios Attack Proved Vibe Coding's Biggest Blind Spot
Cover image for The Axios Attack Proved Vibe Coding's Biggest Blind Spot

The Axios Attack Proved Vibe Coding's Biggest Blind Spot

Comments
6 min read
Frontend Security: A Senior Engineer's Guide
Cover image for Frontend Security: A Senior Engineer's Guide

Frontend Security: A Senior Engineer's Guide

Comments
6 min read
Indirect Prompt Injection Can Be Stopped by the AI Itself — Embed Directional Context Narrowing into Your Design
Cover image for Indirect Prompt Injection Can Be Stopped by the AI Itself — Embed Directional Context Narrowing into Your Design

Indirect Prompt Injection Can Be Stopped by the AI Itself — Embed Directional Context Narrowing into Your Design

Comments
4 min read
Combining Hermes Agent with NVIDIA OpenShell so I can let an AI agent do whatever it wants... inside a cage it can't break out of.
Cover image for Combining Hermes Agent with NVIDIA OpenShell so I can let an AI agent do whatever it wants... inside a cage it can't break out of.

Combining Hermes Agent with NVIDIA OpenShell so I can let an AI agent do whatever it wants... inside a cage it can't break out of.

Comments
4 min read
🔐 VPN Site-to-Site AWS + ER605 (IPSec IKEv1) — Guia completo

🔐 VPN Site-to-Site AWS + ER605 (IPSec IKEv1) — Guia completo

Comments
2 min read
Someone Backdoored axios on npm. Here is How to Check if You Were Hit

Someone Backdoored axios on npm. Here is How to Check if You Were Hit

Comments
5 min read
Volt Typhoon Weaponized SOHO Routers at Scale — Here's Your Zero-Trust Playbook for the Remote Edge

Volt Typhoon Weaponized SOHO Routers at Scale — Here's Your Zero-Trust Playbook for the Remote Edge

1
Comments
6 min read
Why Observability Is Not Enough: Building a True Kill Switch for AI Agents

Why Observability Is Not Enough: Building a True Kill Switch for AI Agents

Comments
2 min read
AI Sandboxes Aren't Enough: We Need Execution Governance

AI Sandboxes Aren't Enough: We Need Execution Governance

Comments
4 min read
Cara Kerja Serangan Rantai Pasokan NPM Axios (Dan Cara Melindungi Proyek API Anda)
Cover image for Cara Kerja Serangan Rantai Pasokan NPM Axios (Dan Cara Melindungi Proyek API Anda)

Cara Kerja Serangan Rantai Pasokan NPM Axios (Dan Cara Melindungi Proyek API Anda)

Comments
7 min read
What the Claude Code Source Leak Reveals About AI Coding Tool Architecture
Cover image for What the Claude Code Source Leak Reveals About AI Coding Tool Architecture

What the Claude Code Source Leak Reveals About AI Coding Tool Architecture

Comments
8 min read
Claudeコード流出が明らかにするAIコーディングツールのアーキテクチャ
Cover image for Claudeコード流出が明らかにするAIコーディングツールのアーキテクチャ

Claudeコード流出が明らかにするAIコーディングツールのアーキテクチャ

Comments
2 min read
x402 and TEE Together: What Must Pass Before Promotion

x402 and TEE Together: What Must Pass Before Promotion

Comments
7 min read
Avoid Vulnerable Build: Light onto Cryptographic Source Code Security
Cover image for Avoid Vulnerable Build: Light onto Cryptographic Source Code Security

Avoid Vulnerable Build: Light onto Cryptographic Source Code Security

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.