Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
pip-guardian on Pypi

pip-guardian on Pypi

Comments
2 min read
What's actually inside an EU AI Act Annex IV technical file (and what engineers usually miss)
Cover image for What's actually inside an EU AI Act Annex IV technical file (and what engineers usually miss)

What's actually inside an EU AI Act Annex IV technical file (and what engineers usually miss)

Comments
4 min read
That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type

That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type

Comments
6 min read
CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out

CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out

Comments
3 min read
Are Quantum Computers Dangerous for Modern Cryptography?

Are Quantum Computers Dangerous for Modern Cryptography?

Comments
2 min read
Urgent Security Alert: How a GitHub Exploit Impacts Engineering Performance and Trust
Cover image for Urgent Security Alert: How a GitHub Exploit Impacts Engineering Performance and Trust

Urgent Security Alert: How a GitHub Exploit Impacts Engineering Performance and Trust

Comments
5 min read
Is MCP a security concern for game developers?
Cover image for Is MCP a security concern for game developers?

Is MCP a security concern for game developers?

Comments
6 min read
Unpacking GitHub Personal Access Tokens: A Guide for Developer Productivity and Secure Integrations
Cover image for Unpacking GitHub Personal Access Tokens: A Guide for Developer Productivity and Secure Integrations

Unpacking GitHub Personal Access Tokens: A Guide for Developer Productivity and Secure Integrations

Comments
5 min read
Expanding Kubernetes Admin Roles: Key Responsibilities Beyond Basic Automation

Expanding Kubernetes Admin Roles: Key Responsibilities Beyond Basic Automation

Comments
12 min read
Unlocking the Future: APIs and the Evolution of Authorization

Unlocking the Future: APIs and the Evolution of Authorization

Comments
3 min read
Fine-Grained Control: Using the Admin Policy Editor for Agent Wallets
Cover image for Fine-Grained Control: Using the Admin Policy Editor for Agent Wallets

Fine-Grained Control: Using the Admin Policy Editor for Agent Wallets

Comments
4 min read
The Bricking Point: Analyzing Permanent Fund Loss in Panoptic’s SFPM

The Bricking Point: Analyzing Permanent Fund Loss in Panoptic’s SFPM

Comments
3 min read
The Kidney Problem

The Kidney Problem

Comments
6 min read
"I Put ML-KEM-768 Post-Quantum Crypto in a Mesh Network — Here's What Broke"
Cover image for "I Put ML-KEM-768 Post-Quantum Crypto in a Mesh Network — Here's What Broke"

"I Put ML-KEM-768 Post-Quantum Crypto in a Mesh Network — Here's What Broke"

1
Comments
5 min read
I built an open-source zero-trust security runtime for AI agents. Here’s what I learned.
Cover image for I built an open-source zero-trust security runtime for AI agents. Here’s what I learned.

I built an open-source zero-trust security runtime for AI agents. Here’s what I learned.

6
Comments 2
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.