Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

Comments
3 min read
Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Comments
5 min read
Mastering Kubernetes Security: Protecting Your Cloud-Native Applications
Cover image for Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

1
Comments
5 min read
How to Secure Your App Using OAuth2 with Ory Hydra
Cover image for How to Secure Your App Using OAuth2 with Ory Hydra

How to Secure Your App Using OAuth2 with Ory Hydra

1
Comments
2 min read
Is Your Email Already Compromised? How to Check in 30 Seconds
Cover image for Is Your Email Already Compromised? How to Check in 30 Seconds

Is Your Email Already Compromised? How to Check in 30 Seconds

2
Comments
2 min read
Mutable tags. 10,000 pipelines. One credential. — What the Trivy attack taught me about implicit trust
Cover image for Mutable tags. 10,000 pipelines. One credential. — What the Trivy attack taught me about implicit trust

Mutable tags. 10,000 pipelines. One credential. — What the Trivy attack taught me about implicit trust

1
Comments
10 min read
SQL Injection – UNION attack | PortSwigger Lab Note #3

SQL Injection – UNION attack | PortSwigger Lab Note #3

5
Comments
1 min read
BGEANX Exchange Analysis: The Era of Information Sharing for Crypto Assets Arrives, Compliance Thresholds Are Rising

BGEANX Exchange Analysis: The Era of Information Sharing for Crypto Assets Arrives, Compliance Thresholds Are Rising

Comments
3 min read
Building End-to-End Encrypted Agent Conversations with Registry Broker

Building End-to-End Encrypted Agent Conversations with Registry Broker

Comments
5 min read
I Scanned 50 AI Agents for Security Vulnerabilities — 94% Failed
Cover image for I Scanned 50 AI Agents for Security Vulnerabilities — 94% Failed

I Scanned 50 AI Agents for Security Vulnerabilities — 94% Failed

2
Comments 1
4 min read
Your AI Gateway Just Became an Attack Vector: Anatomy of the LiteLLM Supply Chain Compromise
Cover image for Your AI Gateway Just Became an Attack Vector: Anatomy of the LiteLLM Supply Chain Compromise

Your AI Gateway Just Became an Attack Vector: Anatomy of the LiteLLM Supply Chain Compromise

1
Comments 1
7 min read
A Real WebSocket Hijack Hit an AI Agent Framework. Here's What We Learned.
Cover image for A Real WebSocket Hijack Hit an AI Agent Framework. Here's What We Learned.

A Real WebSocket Hijack Hit an AI Agent Framework. Here's What We Learned.

2
Comments
4 min read
65% of MCP Tools Now Take Actions. 16 Months Ago It Was 27%.

65% of MCP Tools Now Take Actions. 16 Months Ago It Was 27%.

2
Comments 1
3 min read
How I built tamper-proof audit logs for AI agents at 15

How I built tamper-proof audit logs for AI agents at 15

Comments
3 min read
Implementing Role-Based Access Control (RBAC) on Solana

Implementing Role-Based Access Control (RBAC) on Solana

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.