Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Stopped Form Spam Without reCAPTCHA
Cover image for How I Stopped Form Spam Without reCAPTCHA

How I Stopped Form Spam Without reCAPTCHA

Comments 1
7 min read
Architecture Documentation as a First-Class Engineering Asset
Cover image for Architecture Documentation as a First-Class Engineering Asset

Catching systemic failures linters miss

Architecture Documentation as a First-Class Engineering Asset

48
Comments 27
7 min read
The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments
Cover image for The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments

The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments

1
Comments
3 min read
Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?
Cover image for Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?

Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?

Comments
6 min read
The Math Behind RSA #3: Implementing RSA from Scratch in Python

The Math Behind RSA #3: Implementing RSA from Scratch in Python

Comments
7 min read
How we handled a coordinated scraper botnet and moved to wishdo.io
Cover image for How we handled a coordinated scraper botnet and moved to wishdo.io

How we handled a coordinated scraper botnet and moved to wishdo.io

3
Comments
3 min read
Building OneRule: A Technical Deep Dive into an Offline Password Manager with Flutter, SQLCipher, and AES-GCM

Building OneRule: A Technical Deep Dive into an Offline Password Manager with Flutter, SQLCipher, and AES-GCM

1
Comments 2
9 min read
How to Build Access Control Without Passwords, Keys, or Secrets

How to Build Access Control Without Passwords, Keys, or Secrets

Comments
5 min read
Effective Multitenancy in Kubernetes: Strategies for Isolation, Security, and Performance Optimization

Effective Multitenancy in Kubernetes: Strategies for Isolation, Security, and Performance Optimization

Comments
9 min read
OpenAI Just Killed Sora. Claude Took Over Your Mac. And the Most Popular AI Library Was Malware.
Cover image for OpenAI Just Killed Sora. Claude Took Over Your Mac. And the Most Popular AI Library Was Malware.

OpenAI Just Killed Sora. Claude Took Over Your Mac. And the Most Popular AI Library Was Malware.

Comments
7 min read
How OneCLI Secures AI Agent API Keys Without Code Changes
Cover image for How OneCLI Secures AI Agent API Keys Without Code Changes

How OneCLI Secures AI Agent API Keys Without Code Changes

Comments
5 min read
How to Defend Your AI Agent Against Prompt Injection

How to Defend Your AI Agent Against Prompt Injection

1
Comments 2
4 min read
How .pth Files Became a Supply Chain Weapon (and How to Detect Them)

How .pth Files Became a Supply Chain Weapon (and How to Detect Them)

Comments
1 min read
How I Secured My AI Assistant's Data by Moving It Off the Internet-Facing Machine
Cover image for How I Secured My AI Assistant's Data by Moving It Off the Internet-Facing Machine

How I Secured My AI Assistant's Data by Moving It Off the Internet-Facing Machine

Comments
4 min read
The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials From Thousands of AI Environments
Cover image for The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials From Thousands of AI Environments

The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials From Thousands of AI Environments

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.