Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Comments
5 min read
Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026
Cover image for Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026

Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026

1
Comments 1
4 min read
ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file
Cover image for ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file

ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file

Comments
3 min read
One security alert changed how I think about dependencies
Cover image for One security alert changed how I think about dependencies

One security alert changed how I think about dependencies

1
Comments
2 min read
Your npm Package Is Leaking Source Code (And You Probably Don't Know It)
Cover image for Your npm Package Is Leaking Source Code (And You Probably Don't Know It)

Your npm Package Is Leaking Source Code (And You Probably Don't Know It)

Comments
4 min read
Anthropic's Accidental Release of Claude Code's Source Code: Irretrievable and Publicly Accessible

Anthropic's Accidental Release of Claude Code's Source Code: Irretrievable and Publicly Accessible

Comments
14 min read
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Comments
9 min read
Claude Mythos Leak: Why Cybersec Pros + Tech Workers Should Be Nervous Right Now 😰

Claude Mythos Leak: Why Cybersec Pros + Tech Workers Should Be Nervous Right Now 😰

Comments
3 min read
Mulesoft with AI
Cover image for Mulesoft with AI

Mulesoft with AI

Comments
3 min read
Indirect Prompt Injection Is a Trust Boundary Problem

Indirect Prompt Injection Is a Trust Boundary Problem

Comments
5 min read
This Week in AI Security: OpenAI Codex Hacked, LiteLLM Supply Chain Attack, Claude Gets Computer Control

This Week in AI Security: OpenAI Codex Hacked, LiteLLM Supply Chain Attack, Claude Gets Computer Control

Comments
3 min read
Claude Mythos: What We Actually Know (and What We Don't)
Cover image for Claude Mythos: What We Actually Know (and What We Don't)

Claude Mythos: What We Actually Know (and What We Don't)

Comments
8 min read
Your package was compromised. How do you prove which version you actually shipped?

Your package was compromised. How do you prove which version you actually shipped?

Comments
3 min read
Security Is a Myth | The Axios Supply Chain Attack
Cover image for Security Is a Myth | The Axios Supply Chain Attack

Security Is a Myth | The Axios Supply Chain Attack

2
Comments
5 min read
The LiteLLM Supply Chain Attack: Why Vibe Coders Are the Most Exposed

The LiteLLM Supply Chain Attack: Why Vibe Coders Are the Most Exposed

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.