Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building Zero-Trust API Authentication in 2026: Beyond JWT

Building Zero-Trust API Authentication in 2026: Beyond JWT

Comments
6 min read
I built an AI-proof social network at 15, alone
Cover image for I built an AI-proof social network at 15, alone

I built an AI-proof social network at 15, alone

1
Comments
3 min read
Secure Passwords, Tokens, and Data Masking in Python - A Toolkit for the AI Era
Cover image for Secure Passwords, Tokens, and Data Masking in Python - A Toolkit for the AI Era

Secure Passwords, Tokens, and Data Masking in Python - A Toolkit for the AI Era

Comments
4 min read
Your AI Just Hardcoded Your Stripe Key. Here's Why It Keeps Happening.

Your AI Just Hardcoded Your Stripe Key. Here's Why It Keeps Happening.

Comments
3 min read
SSH hardening checklist for production servers
Cover image for SSH hardening checklist for production servers

SSH hardening checklist for production servers

2
Comments
6 min read
Security Vulnerabilities Every Developer Should Know (OWASP Top 10 Simplified)

Security Vulnerabilities Every Developer Should Know (OWASP Top 10 Simplified)

Comments
5 min read
We Built an MCP Security Scanner — Here's What We Found Scanning 50+ Servers

We Built an MCP Security Scanner — Here's What We Found Scanning 50+ Servers

Comments
6 min read
State of MCP Security 2026: We Scanned 15,923 AI Tools. Here's What We Found.

State of MCP Security 2026: We Scanned 15,923 AI Tools. Here's What We Found.

Comments
3 min read
LiteLLM got hacked. I built a simpler LLM gateway you can actually audit.
Cover image for LiteLLM got hacked. I built a simpler LLM gateway you can actually audit.

LiteLLM got hacked. I built a simpler LLM gateway you can actually audit.

8
Comments
4 min read
How I Implemented Logout From One Device and All Devices in My Auth System
Cover image for How I Implemented Logout From One Device and All Devices in My Auth System

How I Implemented Logout From One Device and All Devices in My Auth System

Comments
4 min read
Why AI Agents Need Verifiable Identity

Why AI Agents Need Verifiable Identity

Comments
6 min read
Zero-Days, Supply Chain & AI Self-Jailbreaks: Top Security Threats

Zero-Days, Supply Chain & AI Self-Jailbreaks: Top Security Threats

1
Comments
3 min read
A VC-Backed Startup Just Open-Sourced What I Built in My Apartment

A VC-Backed Startup Just Open-Sourced What I Built in My Apartment

Comments
3 min read
Building Authentication Without Collecting Any Personal Data

Building Authentication Without Collecting Any Personal Data

1
Comments
5 min read
How to Set Up Passwordless SSH Login with PuTTY.
Cover image for How to Set Up Passwordless SSH Login with PuTTY.

How to Set Up Passwordless SSH Login with PuTTY.

6
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.