Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Anatomy of a Smart Contract Audit: What Auditors Look For

The Anatomy of a Smart Contract Audit: What Auditors Look For

Comments
4 min read
I Moved My Database Behind a VPN on AWS — Here's Every Step (With the Networking Concepts That Actually Matter)

I Moved My Database Behind a VPN on AWS — Here's Every Step (With the Networking Concepts That Actually Matter)

Comments
16 min read
Two kinds of AI testing shipped this month. They solve completely different problems.

Two kinds of AI testing shipped this month. They solve completely different problems.

1
Comments
5 min read
The Worst Morning of My Developer Life — A Patient Hacker, a Fake AI Tool, and 150 Deleted Repos — My Story
Cover image for The Worst Morning of My Developer Life — A Patient Hacker, a Fake AI Tool, and 150 Deleted Repos — My Story

The Worst Morning of My Developer Life — A Patient Hacker, a Fake AI Tool, and 150 Deleted Repos — My Story

8
Comments
9 min read
npm Provenance and SLSA: The Supply Chain Hygiene Baseline Every Team Needs in 2026

npm Provenance and SLSA: The Supply Chain Hygiene Baseline Every Team Needs in 2026

Comments
5 min read
MCP Connector Poisoning: How Compromised npm Packages Hijack Your AI Agent

MCP Connector Poisoning: How Compromised npm Packages Hijack Your AI Agent

Comments 1
5 min read
How to Evaluate an MCP Server Before You Connect It to Your Agents
Cover image for How to Evaluate an MCP Server Before You Connect It to Your Agents

How to Evaluate an MCP Server Before You Connect It to Your Agents

1
Comments
10 min read
I Audited 7 Official MCP Servers — Here Is What I Found

I Audited 7 Official MCP Servers — Here Is What I Found

1
Comments
4 min read
🛡️ Hardening VPS Ubuntu: Mengunci Pintu dari Serangan Botnet

🛡️ Hardening VPS Ubuntu: Mengunci Pintu dari Serangan Botnet

Comments
2 min read
An AI Hard Technology System Cycle Under Security Constraints: The 15th Five-Year Industrial Roadmap 十五五产业路线图:安全约束下的AI 硬科技系统周期
Cover image for An AI Hard Technology System Cycle Under Security Constraints: The 15th Five-Year Industrial Roadmap 十五五产业路线图:安全约束下的AI 硬科技系统周期

An AI Hard Technology System Cycle Under Security Constraints: The 15th Five-Year Industrial Roadmap 十五五产业路线图:安全约束下的AI 硬科技系统周期

1
Comments
3 min read
I Got a Job Offer. But, It Came With Malware.
Cover image for I Got a Job Offer. But, It Came With Malware.

I Got a Job Offer. But, It Came With Malware.

4
Comments
12 min read
Your AI Agent's Vouches Mean Nothing Without Behavioral Proof

Your AI Agent's Vouches Mean Nothing Without Behavioral Proof

Comments
3 min read
How Rynko Flow Maps to the AWS Agentic AI Security Scoping Matrix
Cover image for How Rynko Flow Maps to the AWS Agentic AI Security Scoping Matrix

How Rynko Flow Maps to the AWS Agentic AI Security Scoping Matrix

Comments
14 min read
ScamDetect: Building a Multilingual AI-Powered Phishing Detection Platform

ScamDetect: Building a Multilingual AI-Powered Phishing Detection Platform

2
Comments
13 min read
From Curiosity to Contribution: My Journey with OWASP BLT and the Road to GSoC 2026
Cover image for From Curiosity to Contribution: My Journey with OWASP BLT and the Road to GSoC 2026

From Curiosity to Contribution: My Journey with OWASP BLT and the Road to GSoC 2026

1
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.