Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
7 Security Patterns Every MCP Server Developer Should Follow

7 Security Patterns Every MCP Server Developer Should Follow

Comments
5 min read
The MCP Server Testing Guide: How to Test Before You Ship

The MCP Server Testing Guide: How to Test Before You Ship

Comments
4 min read
How MCP Servers Handle Authentication (And Where They Get It Wrong)

How MCP Servers Handle Authentication (And Where They Get It Wrong)

Comments
4 min read
I Used a Newsroom Privacy Tool to Audit 100+ Adult Sites. Here's How the Stack Works.

I Used a Newsroom Privacy Tool to Audit 100+ Adult Sites. Here's How the Stack Works.

Comments
6 min read
How to Build a Secure MCP Server from Scratch

How to Build a Secure MCP Server from Scratch

Comments
4 min read
How to Audit an MCP Server Before Installing It (A Practical Checklist)

How to Audit an MCP Server Before Installing It (A Practical Checklist)

Comments
4 min read
Show HN: Prompt Armour – Real-time PII detection for AI chatbots, 100% local

Show HN: Prompt Armour – Real-time PII detection for AI chatbots, 100% local

Comments
1 min read
Add Cryptographic Identity to Your LangChain Agent in 5 Minutes

Add Cryptographic Identity to Your LangChain Agent in 5 Minutes

Comments
3 min read
GPUs in Every PoP: Inside Cato Neural Edge and the Shift to GPU-Accelerated Cloud Security

GPUs in Every PoP: Inside Cato Neural Edge and the Shift to GPU-Accelerated Cloud Security

1
Comments
5 min read
How to Secure Your MCP Server Against Prompt Injection (Practical Guide)

How to Secure Your MCP Server Against Prompt Injection (Practical Guide)

Comments
5 min read
The Sandbox

The Sandbox

Comments
6 min read
9 Real MCP Security Breaches: CVEs, Data Leaks, and Why the Protocol Needs a Cryptographic Identity Layer

9 Real MCP Security Breaches: CVEs, Data Leaks, and Why the Protocol Needs a Cryptographic Identity Layer

1
Comments
4 min read
Designing Authentication Systems Across Multiple Identity Providers: Lessons from Real Failures

Designing Authentication Systems Across Multiple Identity Providers: Lessons from Real Failures

Comments
2 min read
Your AI agents are a security nightmare
Cover image for Your AI agents are a security nightmare

Your AI agents are a security nightmare

3
Comments 1
7 min read
The MCP Gateway Landscape in 2026: Where MCPProxy Fits

The MCP Gateway Landscape in 2026: Where MCPProxy Fits

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.