Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Tessellated Constellation Architecture
Cover image for Tessellated Constellation Architecture

Tessellated Constellation Architecture

Comments
2 min read
CVE-2026-32242: CVE-2026-32242: Authentication Bypass via Race Condition in Parse Server OAuth2 Adapter

CVE-2026-32242: CVE-2026-32242: Authentication Bypass via Race Condition in Parse Server OAuth2 Adapter

1
Comments
2 min read
Why Headless Browsers Get Detected: A Technical Breakdown
Cover image for Why Headless Browsers Get Detected: A Technical Breakdown

Why Headless Browsers Get Detected: A Technical Breakdown

Comments
5 min read
Browser Fingerprinting: How 12 Lines of JavaScript Identify You Without Cookies

Browser Fingerprinting: How 12 Lines of JavaScript Identify You Without Cookies

Comments 1
5 min read
How to run untrusted HTML/JS safely with `allow-same-origin`
Cover image for How to run untrusted HTML/JS safely with `allow-same-origin`

How to run untrusted HTML/JS safely with `allow-same-origin`

2
Comments
5 min read
I Moved My Database Behind a VPN on AWS — Here's Every Step (With the Networking Concepts That Actually Matter)

I Moved My Database Behind a VPN on AWS — Here's Every Step (With the Networking Concepts That Actually Matter)

Comments
16 min read
The Anatomy of a Smart Contract Audit: What Auditors Look For

The Anatomy of a Smart Contract Audit: What Auditors Look For

Comments
4 min read
Two kinds of AI testing shipped this month. They solve completely different problems.

Two kinds of AI testing shipped this month. They solve completely different problems.

1
Comments
5 min read
The Worst Morning of My Developer Life — A Patient Hacker, a Fake AI Tool, and 150 Deleted Repos — My Story
Cover image for The Worst Morning of My Developer Life — A Patient Hacker, a Fake AI Tool, and 150 Deleted Repos — My Story

The Worst Morning of My Developer Life — A Patient Hacker, a Fake AI Tool, and 150 Deleted Repos — My Story

8
Comments
9 min read
npm Provenance and SLSA: The Supply Chain Hygiene Baseline Every Team Needs in 2026

npm Provenance and SLSA: The Supply Chain Hygiene Baseline Every Team Needs in 2026

Comments
5 min read
MCP Connector Poisoning: How Compromised npm Packages Hijack Your AI Agent

MCP Connector Poisoning: How Compromised npm Packages Hijack Your AI Agent

Comments 1
5 min read
I Audited 7 Official MCP Servers — Here Is What I Found

I Audited 7 Official MCP Servers — Here Is What I Found

1
Comments
4 min read
How to Evaluate an MCP Server Before You Connect It to Your Agents
Cover image for How to Evaluate an MCP Server Before You Connect It to Your Agents

How to Evaluate an MCP Server Before You Connect It to Your Agents

1
Comments
10 min read
🛡️ Hardening VPS Ubuntu: Mengunci Pintu dari Serangan Botnet

🛡️ Hardening VPS Ubuntu: Mengunci Pintu dari Serangan Botnet

Comments
2 min read
An AI Hard Technology System Cycle Under Security Constraints: The 15th Five-Year Industrial Roadmap 十五五产业路线图:安全约束下的AI 硬科技系统周期
Cover image for An AI Hard Technology System Cycle Under Security Constraints: The 15th Five-Year Industrial Roadmap 十五五产业路线图:安全约束下的AI 硬科技系统周期

An AI Hard Technology System Cycle Under Security Constraints: The 15th Five-Year Industrial Roadmap 十五五产业路线图:安全约束下的AI 硬科技系统周期

1
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.