Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Soul-Evil Attack: How Malicious Personas Hijack AI Agents (And How to Stop Them)

The Soul-Evil Attack: How Malicious Personas Hijack AI Agents (And How to Stop Them)

Comments
6 min read
Show HN: Isartor – Pure-Rust prompt firewall, deflects 60-95% of LLM traffic

Show HN: Isartor – Pure-Rust prompt firewall, deflects 60-95% of LLM traffic

Comments
1 min read
Supply Chain Security: 4 Commands That Would Have Stopped the axios and litellm Attacks

Supply Chain Security: 4 Commands That Would Have Stopped the axios and litellm Attacks

Comments
5 min read
Agent Identity Verification: Lessons from Building a Production Agent Registry

Agent Identity Verification: Lessons from Building a Production Agent Registry

1
Comments
2 min read
What Claude Code's Leaked Source Reveals About AI Agent Governance
Cover image for What Claude Code's Leaked Source Reveals About AI Agent Governance

What Claude Code's Leaked Source Reveals About AI Agent Governance

Comments
3 min read
We Re-Scanned the Top 50 ClawHub Skills — Things Have Changed
Cover image for We Re-Scanned the Top 50 ClawHub Skills — Things Have Changed

We Re-Scanned the Top 50 ClawHub Skills — Things Have Changed

1
Comments
3 min read
Fraud Detection API: What to Look For in 2026

Fraud Detection API: What to Look For in 2026

Comments
3 min read
The Hidden Cost of SaaS Free Trial Abuse (And How to Detect It)

The Hidden Cost of SaaS Free Trial Abuse (And How to Detect It)

Comments
1 min read
Preventing Agent Hijacking With Cryptographic Identity and RBAC

Preventing Agent Hijacking With Cryptographic Identity and RBAC

Comments
6 min read
axios Got Hijacked Today: A Technical Breakdown of the Most Sophisticated npm Supply Chain Attack Yet
Cover image for axios Got Hijacked Today: A Technical Breakdown of the Most Sophisticated npm Supply Chain Attack Yet

axios Got Hijacked Today: A Technical Breakdown of the Most Sophisticated npm Supply Chain Attack Yet

Comments
5 min read
How to Protect JavaScript Projects Against Supply Chain Attacks

How to Protect JavaScript Projects Against Supply Chain Attacks

Comments
2 min read
3 Broken Auth Bugs Cursor Keeps Writing Into JWT Code
Cover image for 3 Broken Auth Bugs Cursor Keeps Writing Into JWT Code

3 Broken Auth Bugs Cursor Keeps Writing Into JWT Code

Comments
4 min read
HBR Says AI Agents Act Like Malware. Here's What To Do About It.

HBR Says AI Agents Act Like Malware. Here's What To Do About It.

Comments
3 min read
Payday Super SMS OTP costs 2026: why Australian super funds authentication breaks under APRA CPS 234 and ACMA Sender ID rules

Payday Super SMS OTP costs 2026: why Australian super funds authentication breaks under APRA CPS 234 and ACMA Sender ID rules

Comments
4 min read
what if MCP servers had a Lighthouse-style security score?

what if MCP servers had a Lighthouse-style security score?

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.