Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
7 Mac Apps That Protect Your Privacy and Security as a Developer in 2026

7 Mac Apps That Protect Your Privacy and Security as a Developer in 2026

Comments
3 min read
OpenClaw's Credential Problem Is Structural, Not Incidental

OpenClaw's Credential Problem Is Structural, Not Incidental

Comments
3 min read
We Scanned 4,275 MCP Servers. Most of Them Shouldn't Be Trusted.

We Scanned 4,275 MCP Servers. Most of Them Shouldn't Be Trusted.

1
Comments
6 min read
Smart Contract Security: Common Vulnerabilities and How to Avoid Them (Ethereum, Solana, BSC)

Smart Contract Security: Common Vulnerabilities and How to Avoid Them (Ethereum, Solana, BSC)

2
Comments
6 min read
Why Agent Discovery Systems Check Identity First (and Why That's Wrong)
Cover image for Why Agent Discovery Systems Check Identity First (and Why That's Wrong)

Why Agent Discovery Systems Check Identity First (and Why That's Wrong)

1
Comments
5 min read
Hardening JavaScript JITs: Practical Mitigations for Modern Engines
Cover image for Hardening JavaScript JITs: Practical Mitigations for Modern Engines

Hardening JavaScript JITs: Practical Mitigations for Modern Engines

Comments
9 min read
Why every AI agent needs a cryptographic identity

Why every AI agent needs a cryptographic identity

Comments
3 min read
Install NetBird on openSUSE MicroOS

Install NetBird on openSUSE MicroOS

Comments
2 min read
Everyone Talks About How to Build Secure Auth. Nobody Talks About What to Watch After You Ship It.
Cover image for Everyone Talks About How to Build Secure Auth. Nobody Talks About What to Watch After You Ship It.

Everyone Talks About How to Build Secure Auth. Nobody Talks About What to Watch After You Ship It.

7
Comments
10 min read
When /pair approve Bypasses the Scope Guard

When /pair approve Bypasses the Scope Guard

Comments
2 min read
Before Your Agent Pays, It Needs to Prove Who It Is

Before Your Agent Pays, It Needs to Prove Who It Is

1
Comments
3 min read
OAuth 2.0 Explained: From Authorization Codes to PKCE (The Complete Picture)

OAuth 2.0 Explained: From Authorization Codes to PKCE (The Complete Picture)

2
Comments
4 min read
The Privacy Problem with Online PDF Tools (and How I Fixed It)

The Privacy Problem with Online PDF Tools (and How I Fixed It)

Comments
4 min read
The Axios NPM Package Compromise: Lessons for Startups and Tech Firms

The Axios NPM Package Compromise: Lessons for Startups and Tech Firms

1
Comments 2
5 min read
190 Things Claude Code Hooks Cannot Enforce (And What to Do Instead)

190 Things Claude Code Hooks Cannot Enforce (And What to Do Instead)

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.