Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Day 13: Mastering LD_PRELOAD Privilege Escalation 🛡️

Day 13: Mastering LD_PRELOAD Privilege Escalation 🛡️

Comments
1 min read
Re-imagine DevSecOps with AWS - CD applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer
Cover image for Re-imagine DevSecOps with AWS - CD applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer

Re-imagine DevSecOps with AWS - CD applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer

Comments
9 min read
CVE-2026-30241: CVE-2026-30241: Missing Query Depth Validation in Mercurius GraphQL Subscriptions

CVE-2026-30241: CVE-2026-30241: Missing Query Depth Validation in Mercurius GraphQL Subscriptions

1
Comments
2 min read
I Spent 2 Sessions Auditing zkVerify's Substrate Code — Here's What I Found (And Didn't Find)

I Spent 2 Sessions Auditing zkVerify's Substrate Code — Here's What I Found (And Didn't Find)

1
Comments
6 min read
My AI Agent Leaked an API Key, Burned $47, and Looped 200 Times — So I Built It a Bodyguard

My AI Agent Leaked an API Key, Burned $47, and Looped 200 Times — So I Built It a Bodyguard

1
Comments
3 min read
OpenClaw SLOs for internal AI ops: availability, latency, and error budgets on Hetzner

OpenClaw SLOs for internal AI ops: availability, latency, and error budgets on Hetzner

1
Comments
4 min read
Zero Trust: A Strategy, Not a Product

Zero Trust: A Strategy, Not a Product

Comments
15 min read
Identity and Access Management Explained for Developers

Identity and Access Management Explained for Developers

Comments
4 min read
GHSA-QR2G-P6Q7-W82M: GHSA-qr2g-p6q7-w82m: Critical Payment Verification Bypass in Coinbase x402 SDK (Solana)

GHSA-QR2G-P6Q7-W82M: GHSA-qr2g-p6q7-w82m: Critical Payment Verification Bypass in Coinbase x402 SDK (Solana)

1
Comments
2 min read
I Built CrowEnv: An Encrypted Replacement for .env Files

I Built CrowEnv: An Encrypted Replacement for .env Files

Comments
5 min read
The Lock Breaks Downward

The Lock Breaks Downward

1
Comments
5 min read
How to Find IDOR Vulnerabilities: The Bug Bounty Hunter's Practical Guide

How to Find IDOR Vulnerabilities: The Bug Bounty Hunter's Practical Guide

Comments
6 min read
I built an open-source firewall for AI agents — it blocks dangerous tool calls before they execute
Cover image for I built an open-source firewall for AI agents — it blocks dangerous tool calls before they execute

I built an open-source firewall for AI agents — it blocks dangerous tool calls before they execute

2
Comments 2
2 min read
Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories
Cover image for Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories

Finding Dependency Confusion Vulnerabilities in Public GitHub Repositories

1
Comments
4 min read
Three Crypto Exploits, Three Wrong Fixes, and What VCP v1.1 Actually Does
Cover image for Three Crypto Exploits, Three Wrong Fixes, and What VCP v1.1 Actually Does

Three Crypto Exploits, Three Wrong Fixes, and What VCP v1.1 Actually Does

2
Comments
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.