Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
what if MCP servers had a Lighthouse-style security score?

what if MCP servers had a Lighthouse-style security score?

1
Comments
2 min read
Security by Default: The Case for Local Code Execution

Security by Default: The Case for Local Code Execution

Comments
3 min read
LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.
Cover image for LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.

LiteLLM Was Poisoned. Here's What It Reveals About AI Tool Supply Chains.

1
Comments
6 min read
Most Dockerfile Security Scans Stop at Detection — Here’s What Happens Next
Cover image for Most Dockerfile Security Scans Stop at Detection — Here’s What Happens Next

Most Dockerfile Security Scans Stop at Detection — Here’s What Happens Next

Comments
2 min read
OAuth Token Vault Patterns for AI Agents

OAuth Token Vault Patterns for AI Agents

Comments
6 min read
GitHub Fine-Grained PATs: A Roadblock to Secure Org-Level Automation and the Goal of Software Engineering
Cover image for GitHub Fine-Grained PATs: A Roadblock to Secure Org-Level Automation and the Goal of Software Engineering

GitHub Fine-Grained PATs: A Roadblock to Secure Org-Level Automation and the Goal of Software Engineering

1
Comments
5 min read
Software Supply Chain Attacks: Why Your Dependencies Are Your Biggest Vulnerability
Cover image for Software Supply Chain Attacks: Why Your Dependencies Are Your Biggest Vulnerability

Software Supply Chain Attacks: Why Your Dependencies Are Your Biggest Vulnerability

Comments
5 min read
Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Comments
2 min read
How to let AI code with your real API keys (without leaking them)
Cover image for How to let AI code with your real API keys (without leaking them)

How to let AI code with your real API keys (without leaking them)

Comments
2 min read
API Security Best Practices: A Practical Guide for IT Leaders

API Security Best Practices: A Practical Guide for IT Leaders

Comments
4 min read
Let's Encrypt

Let's Encrypt

1
Comments
2 min read
1Password & Dotenvx Tool
Cover image for 1Password & Dotenvx Tool

1Password & Dotenvx Tool

Comments
1 min read
The LLM proxy landscape in 2026: Helicone acquired, LiteLLM compromised, and what's next

The LLM proxy landscape in 2026: Helicone acquired, LiteLLM compromised, and what's next

Comments
3 min read
The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

Comments
9 min read
What Do You Depend On? When the Chain of Trust Breaks
Cover image for What Do You Depend On? When the Chain of Trust Breaks

What Do You Depend On? When the Chain of Trust Breaks

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.