Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Claude Code plugin credentials: what the new keychain storage does and doesn't do
Cover image for Claude Code plugin credentials: what the new keychain storage does and doesn't do

Claude Code plugin credentials: what the new keychain storage does and doesn't do

Comments
5 min read
Remote Server Monitoring over VPN: A Docker Approach (Part 1)
Cover image for Remote Server Monitoring over VPN: A Docker Approach (Part 1)

Remote Server Monitoring over VPN: A Docker Approach (Part 1)

6
Comments
3 min read
Your AI Coding Agent Has Root Access to Your Machine. Does Anything Else?
Cover image for Your AI Coding Agent Has Root Access to Your Machine. Does Anything Else?

Your AI Coding Agent Has Root Access to Your Machine. Does Anything Else?

Comments 1
21 min read
The Trivy Attack: Why SHA Pinning Fails GitHub Actions
Cover image for The Trivy Attack: Why SHA Pinning Fails GitHub Actions

The Trivy Attack: Why SHA Pinning Fails GitHub Actions

Comments
4 min read
AI-Native IDS: Why Edge Security Needs Machine Learning

AI-Native IDS: Why Edge Security Needs Machine Learning

Comments 1
1 min read
We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.
Cover image for We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.

We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.

Comments
8 min read
API Security Testing Automation: Building Comprehensive Testing Pipelines That Actually Catch Vulnerabilities

API Security Testing Automation: Building Comprehensive Testing Pipelines That Actually Catch Vulnerabilities

Comments
20 min read
Don't Lose Your IP Through Your MCP

Don't Lose Your IP Through Your MCP

Comments
12 min read
Stop deploying your AI agents raw. (A quick security PSA)
Cover image for Stop deploying your AI agents raw. (A quick security PSA)

Stop deploying your AI agents raw. (A quick security PSA)

Comments 1
1 min read
The Line Between Research and Surveillance Is Gone
Cover image for The Line Between Research and Surveillance Is Gone

The Line Between Research and Surveillance Is Gone

2
Comments
6 min read
Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page
Cover image for Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page

Why I Built awesome-authorization: Mapping the World of Auth Engines onto a Single Page

Comments
6 min read
Approaches to code reviews

Approaches to code reviews

Comments
6 min read
Docker Security Best Practices for Self-Hosters in 2026

Docker Security Best Practices for Self-Hosters in 2026

2
Comments
10 min read
I Audited a Claude Code Plugin That Reads All Your Browser Cookies
Cover image for I Audited a Claude Code Plugin That Reads All Your Browser Cookies

I Audited a Claude Code Plugin That Reads All Your Browser Cookies

Comments
2 min read
The Four Layers of Hook Perception: Why Your AI Guardrails Aren't Actually Working

The Four Layers of Hook Perception: Why Your AI Guardrails Aren't Actually Working

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.