Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Cover image for Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

5
Comments
10 min read
A Guide to building Advanced MCPs🏗️
Cover image for A Guide to building Advanced MCPs🏗️

A Guide to building Advanced MCPs🏗️

4
Comments
2 min read
7 Prompt Injection Attacks That Work on Most AI Chatbots (And How to Block Them)

7 Prompt Injection Attacks That Work on Most AI Chatbots (And How to Block Them)

Comments 1
4 min read
Verification Theater vs. Real Trust: Why Attestation Alone Isn't Enough for TEE-Based Systems

Verification Theater vs. Real Trust: Why Attestation Alone Isn't Enough for TEE-Based Systems

4
Comments 2
5 min read
Assumptions Do
Cover image for Assumptions Do

Assumptions Do

1
Comments
9 min read
Memory Safety Guarantees in Rust

Memory Safety Guarantees in Rust

Comments
8 min read
Building a Secure Enterprise Developer Workspace on AWS

Building a Secure Enterprise Developer Workspace on AWS

Comments
9 min read
How I Prevented CSV Injection Attacks in a QR Batch Generator (And Why You Should Care)
Cover image for How I Prevented CSV Injection Attacks in a QR Batch Generator (And Why You Should Care)

How I Prevented CSV Injection Attacks in a QR Batch Generator (And Why You Should Care)

Comments
5 min read
Stopping Hidden Threats: AI Safety in PDF Processing
Cover image for Stopping Hidden Threats: AI Safety in PDF Processing

Stopping Hidden Threats: AI Safety in PDF Processing

Comments
2 min read
Understanding the Latest OWASP Top 10 2025 Changes
Cover image for Understanding the Latest OWASP Top 10 2025 Changes

Understanding the Latest OWASP Top 10 2025 Changes

Comments
4 min read
From Motion Alerts to Machine Foresight: How Predictive AI Is Rewriting Virtual Guarding

From Motion Alerts to Machine Foresight: How Predictive AI Is Rewriting Virtual Guarding

Comments
3 min read
Understanding Prompt Injection Attacks

Understanding Prompt Injection Attacks

1
Comments
5 min read
Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis
Cover image for Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Comments
8 min read
CVE-2026-24001: Diffing Dangerously: Infinite Loops and ReDoS in jsdiff

CVE-2026-24001: Diffing Dangerously: Infinite Loops and ReDoS in jsdiff

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.