Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Session Security Configuration: TTL, Renewals, and Absolute Lifetime for AI Agents
Cover image for Session Security Configuration: TTL, Renewals, and Absolute Lifetime for AI Agents

Session Security Configuration: TTL, Renewals, and Absolute Lifetime for AI Agents

Comments
4 min read
I found a critical CVE in a top AI agent framework. Here's what it taught me about how we're all building agents wrong.
Cover image for I found a critical CVE in a top AI agent framework. Here's what it taught me about how we're all building agents wrong.

I found a critical CVE in a top AI agent framework. Here's what it taught me about how we're all building agents wrong.

Comments
3 min read
How I Built a Free Anonymous Email Service — No Phone, No Password, No Logs

How I Built a Free Anonymous Email Service — No Phone, No Password, No Logs

Comments
3 min read
BLERP: Bluetooth Security Exploits and Impersonation Defense
Cover image for BLERP: Bluetooth Security Exploits and Impersonation Defense

BLERP: Bluetooth Security Exploits and Impersonation Defense

Comments
2 min read
Let AI fix your CI" is a supply chain attack waiting to happen. Here's how to do it safely

Let AI fix your CI" is a supply chain attack waiting to happen. Here's how to do it safely

Comments
3 min read
Engineering the Guardian: A Deep Dive into Atomic API Guardrails and Real-Time Systems
Cover image for Engineering the Guardian: A Deep Dive into Atomic API Guardrails and Real-Time Systems

Engineering the Guardian: A Deep Dive into Atomic API Guardrails and Real-Time Systems

1
Comments
3 min read
Governance metadata in A2A Agent Cards, shipping the superset

Governance metadata in A2A Agent Cards, shipping the superset

Comments
2 min read
Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025
Cover image for Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Comments
8 min read
SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume
Cover image for SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume

SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume

Comments
5 min read
TOCTOU of Trust: Why Agent Governance Must Be Continuous

TOCTOU of Trust: Why Agent Governance Must Be Continuous

1
Comments
8 min read
I Built the Middleware Layer MCP is Missing
Cover image for I Built the Middleware Layer MCP is Missing

I Built the Middleware Layer MCP is Missing

Comments
3 min read
Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story
Cover image for Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Comments
11 min read
Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)
Cover image for Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Comments
4 min read
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Comments
3 min read
Your AI Security Problem Starts Before the Prompt
Cover image for Your AI Security Problem Starts Before the Prompt

Your AI Security Problem Starts Before the Prompt

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.