Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)
Cover image for The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)

The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)

5
Comments
5 min read
OSI Layer 4—The Steward
Cover image for OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
Practical MCP-Style Authorization: An Experimental PoC and Guide

Practical MCP-Style Authorization: An Experimental PoC and Guide

Comments
16 min read
Ethereum-Solidity Quiz Q5: What is a Private Mempool?

Ethereum-Solidity Quiz Q5: What is a Private Mempool?

1
Comments
1 min read
Configure it Out with AWS AgentCore and Kiro

Configure it Out with AWS AgentCore and Kiro

Comments
5 min read
Critical Security Vulnerability in React Server Components
Cover image for Critical Security Vulnerability in React Server Components

Critical Security Vulnerability in React Server Components

Comments
2 min read
Why Regex isn't enough: Auditing Discord Bots with AI Reasoning Models

Why Regex isn't enough: Auditing Discord Bots with AI Reasoning Models

Comments
2 min read
Introducing CensorCore | JavaScript Language Censoring Library

Introducing CensorCore | JavaScript Language Censoring Library

Comments 4
4 min read
Designing “Just Enough” API Security for Solo Developers

Designing “Just Enough” API Security for Solo Developers

Comments
4 min read
How I Designed Supabase and Row Level Security (RLS)

How I Designed Supabase and Row Level Security (RLS)

Comments
4 min read
Energia Solar + Mercado Livre para MEI: Requisitos Técnicos em 2025

Energia Solar + Mercado Livre para MEI: Requisitos Técnicos em 2025

Comments
8 min read
Stop uploading sensitive PDFs to random websites

Stop uploading sensitive PDFs to random websites

Comments
2 min read
Swapping Authentication Strategies Without Touching UI: A Frontend Architecture Demo
Cover image for Swapping Authentication Strategies Without Touching UI: A Frontend Architecture Demo

Swapping Authentication Strategies Without Touching UI: A Frontend Architecture Demo

Comments
2 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Hackers Rob. Security Reads the Manual.
Cover image for Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
Security news weekly round-up - 26th December 2025
Cover image for Security news weekly round-up - 26th December 2025

Security news weekly round-up - 26th December 2025

1
Comments 1
2 min read
Best Practices for Connecting LLMs to SQL Databases
Cover image for Best Practices for Connecting LLMs to SQL Databases

Best Practices for Connecting LLMs to SQL Databases

1
Comments
5 min read
Why I stopped using online JSON formatters (and built my own)

Why I stopped using online JSON formatters (and built my own)

1
Comments
2 min read
Commit Signing - GnuPG Agent Forwarding

Commit Signing - GnuPG Agent Forwarding

Comments
2 min read
Verifiable Compute for On-Chain Trading Feels Like an Underrated Breakthrough
Cover image for Verifiable Compute for On-Chain Trading Feels Like an Underrated Breakthrough

Verifiable Compute for On-Chain Trading Feels Like an Underrated Breakthrough

1
Comments 2
2 min read
How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution
Cover image for How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution

How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution

Comments
3 min read
Data Security Simplified: Building Your HIPAA-Compliant Data Lake on AWS

Data Security Simplified: Building Your HIPAA-Compliant Data Lake on AWS

Comments
3 min read
The Fearless Future

The Fearless Future

Comments
3 min read
Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java
Cover image for Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java

Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java

1
Comments
3 min read
😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)
Cover image for 😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)

😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)

Comments 1
3 min read
loading...