Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
why every app with user uploads needs automated content moderation

why every app with user uploads needs automated content moderation

Comments
2 min read
what if MCP servers had a Lighthouse-style security score?

what if MCP servers had a Lighthouse-style security score?

1
Comments
2 min read
The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

Comments
6 min read
AWS Incident Response: SecurityAudit Access
Cover image for AWS Incident Response: SecurityAudit Access

AWS Incident Response: SecurityAudit Access

5
Comments
2 min read
SecureWipe: ANSSI and NIST-compliant secure disk erasure, because rm -rf isn't enough
Cover image for SecureWipe: ANSSI and NIST-compliant secure disk erasure, because rm -rf isn't enough

SecureWipe: ANSSI and NIST-compliant secure disk erasure, because rm -rf isn't enough

Comments
3 min read
CVE-2025-53521: F5 BIG-IP APM RCE — CISA Deadline Is March 30

CVE-2025-53521: F5 BIG-IP APM RCE — CISA Deadline Is March 30

Comments
9 min read
Your AI agent can read every credential on your machine

Your AI agent can read every credential on your machine

1
Comments
3 min read
HashiCorp Says Your Secrets Manager Needs 12 Things. Here's How We Stack Up. 🎹
Cover image for HashiCorp Says Your Secrets Manager Needs 12 Things. Here's How We Stack Up. 🎹

HashiCorp Says Your Secrets Manager Needs 12 Things. Here's How We Stack Up. 🎹

Comments
5 min read
The LiteLLM Supply Chain Attack Changed How We Think About AI Cost Monitoring

The LiteLLM Supply Chain Attack Changed How We Think About AI Cost Monitoring

Comments
2 min read
I Built a Security Scanner That Uses AI to Review Its Own Findings

I Built a Security Scanner That Uses AI to Review Its Own Findings

Comments
4 min read
The DGLD Cross-Chain Minting Exploit: How an OP Stack Bridge Vulnerability Let Attackers Print Gold-Backed Tokens From Nothing

The DGLD Cross-Chain Minting Exploit: How an OP Stack Bridge Vulnerability Let Attackers Print Gold-Backed Tokens From Nothing

1
Comments
6 min read
GitHub Access Persists After AI Coding Tool Subscription Cancellation: How to Revoke Access

GitHub Access Persists After AI Coding Tool Subscription Cancellation: How to Revoke Access

Comments
9 min read
Why Privacy Matters in Developer Tools

Why Privacy Matters in Developer Tools

Comments
4 min read
I Built a Zero-Config Secret Manager in Rust Because .env Files Are Security Theater
Cover image for I Built a Zero-Config Secret Manager in Rust Because .env Files Are Security Theater

I Built a Zero-Config Secret Manager in Rust Because .env Files Are Security Theater

Comments
2 min read
🔑 Authentication Explained Like You're 5

🔑 Authentication Explained Like You're 5

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.