Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
15 Security Practices I Applied to My FastAPI Side Project

15 Security Practices I Applied to My FastAPI Side Project

Comments
6 min read
I ran the same smart contract through three AI security audits. The brief was the bug.
Cover image for I ran the same smart contract through three AI security audits. The brief was the bug.

I ran the same smart contract through three AI security audits. The brief was the bug.

Comments
3 min read
Evidence Stores for Supply Chain Security
Cover image for Evidence Stores for Supply Chain Security

Evidence Stores for Supply Chain Security

Comments
3 min read
Lessons From Processing Millions of Telegram Messages: What We Learned About Spam
Cover image for Lessons From Processing Millions of Telegram Messages: What We Learned About Spam

Lessons From Processing Millions of Telegram Messages: What We Learned About Spam

1
Comments
3 min read
You Can’t Secure Public APIs — You Can Only Control Them

You Can’t Secure Public APIs — You Can Only Control Them

1
Comments
2 min read
1Password Just Launched Unified Access with Anthropic, Cursor, and Vercel. Credential Vaults Are Not Identity.

1Password Just Launched Unified Access with Anthropic, Cursor, and Vercel. Credential Vaults Are Not Identity.

Comments
4 min read
How to Build True Multi-Tenant Database Isolation (Stop using if-statements)
Cover image for How to Build True Multi-Tenant Database Isolation (Stop using if-statements)

How to Build True Multi-Tenant Database Isolation (Stop using if-statements)

2
Comments 2
3 min read
Claude Code CLI Fixed: Configuration Loading Order Defect Resolved to Prevent Unauthorized Permission Elevation

Claude Code CLI Fixed: Configuration Loading Order Defect Resolved to Prevent Unauthorized Permission Elevation

Comments
8 min read
Building a Governance MCP Server for AI Agents

Building a Governance MCP Server for AI Agents

Comments
1 min read
I Built a Free Supply Chain Scanner After Watching Hermes-Agent Get Infected

I Built a Free Supply Chain Scanner After Watching Hermes-Agent Get Infected

1
Comments
4 min read
Modernizing Kubernetes Image Promoter: Enhancing Performance and Features Without Disruption

Modernizing Kubernetes Image Promoter: Enhancing Performance and Features Without Disruption

Comments
7 min read
The Air-Gapped Chronicles: The Insurance Gap — Building Liability-Resistant AI When Insurance Won't Cover the Risk

The Air-Gapped Chronicles: The Insurance Gap — Building Liability-Resistant AI When Insurance Won't Cover the Risk

Comments
6 min read
Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.
Cover image for Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.

Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.

Comments
6 min read
How I Built a Fake Admin Detection System for Telegram Web3 Communities
Cover image for How I Built a Fake Admin Detection System for Telegram Web3 Communities

How I Built a Fake Admin Detection System for Telegram Web3 Communities

1
Comments
1 min read
5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit

5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.