Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Access Equation

The Access Equation

Comments
5 min read
Duplicati vs BorgBackup: Backup Tools Compared

Duplicati vs BorgBackup: Backup Tools Compared

Comments
5 min read
Token Security Just Made Intent the Missing Dimension in AI Agent Security. Identity Is Still the Foundation.

Token Security Just Made Intent the Missing Dimension in AI Agent Security. Identity Is Still the Foundation.

Comments
3 min read
🎧 SpinTicket – DJ Ticket Management System

🎧 SpinTicket – DJ Ticket Management System

2
Comments
2 min read
I got tired of grepping auth.log — so I built a live SSH attack dashboard in Go + Vue 3
Cover image for I got tired of grepping auth.log — so I built a live SSH attack dashboard in Go + Vue 3

I got tired of grepping auth.log — so I built a live SSH attack dashboard in Go + Vue 3

1
Comments 1
2 min read
Testing Governance, Not Just Behavior: What's Different About Agent QA
Cover image for Testing Governance, Not Just Behavior: What's Different About Agent QA

Testing Governance, Not Just Behavior: What's Different About Agent QA

Comments
8 min read
Why Math.random() Will Fail Your Next Security Audit

Why Math.random() Will Fail Your Next Security Audit

Comments
4 min read
"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security

"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security

Comments
3 min read
Building a Rust HTTPS Proxy for AI Agents
Cover image for Building a Rust HTTPS Proxy for AI Agents

Building a Rust HTTPS Proxy for AI Agents

1
Comments
3 min read
Cursor Just Beat Claude at Coding. Rogue AI Agents Are Hacking Their Own Companies. And Jensen Huang Wants to Pay You in Tokens.
Cover image for Cursor Just Beat Claude at Coding. Rogue AI Agents Are Hacking Their Own Companies. And Jensen Huang Wants to Pay You in Tokens.

Cursor Just Beat Claude at Coding. Rogue AI Agents Are Hacking Their Own Companies. And Jensen Huang Wants to Pay You in Tokens.

2
Comments
7 min read
5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes

5 AI Agents vs Tesla: How We Found a P1 Vulnerability in 38 Minutes

Comments
3 min read
Prompt Injection: Anatomy of the Most Critical Attack on LLMs
Cover image for Prompt Injection: Anatomy of the Most Critical Attack on LLMs

Prompt Injection: Anatomy of the Most Critical Attack on LLMs

Comments
4 min read
The Permission Scope Problem: Why AI Agents Fail in Production

The Permission Scope Problem: Why AI Agents Fail in Production

1
Comments 1
3 min read
Welcome to Transitive Dependency Hell

Welcome to Transitive Dependency Hell

Comments 1
5 min read
Prompt Injection Is an Agent Problem, Not a Model Problem
Cover image for Prompt Injection Is an Agent Problem, Not a Model Problem

Prompt Injection Is an Agent Problem, Not a Model Problem

1
Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.