Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Built an Open-Source LLM Security Library in Python (and What I Learned About Prompt Injection)
Cover image for How I Built an Open-Source LLM Security Library in Python (and What I Learned About Prompt Injection)

How I Built an Open-Source LLM Security Library in Python (and What I Learned About Prompt Injection)

Comments
6 min read
Serving RSA and ECDSA from One ASP.NET Core Kestrel Endpoint
Cover image for Serving RSA and ECDSA from One ASP.NET Core Kestrel Endpoint

Serving RSA and ECDSA from One ASP.NET Core Kestrel Endpoint

1
Comments
6 min read
How I Stopped AI Scraping My Flutter App's Data (Clients: You Need This)

How I Stopped AI Scraping My Flutter App's Data (Clients: You Need This)

Comments
8 min read
Decoding the Sandwich Attack: How MEV Bots Exploit Your On-Chain Trades

Decoding the Sandwich Attack: How MEV Bots Exploit Your On-Chain Trades

Comments
4 min read
The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

1
Comments
9 min read
The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

1
Comments
6 min read
OpenAI Just Put a Bounty on Prompt Injection. Here's How to Defend Against It Today.

OpenAI Just Put a Bounty on Prompt Injection. Here's How to Defend Against It Today.

Comments
3 min read
How I built a production-hardened LLM API with HMAC-signed outputs and 30-pattern injection detection

How I built a production-hardened LLM API with HMAC-signed outputs and 30-pattern injection detection

Comments
4 min read
Rate Limiting Your API: Algorithms, Implementation, and the Strategic Thinking Behind It

Rate Limiting Your API: Algorithms, Implementation, and the Strategic Thinking Behind It

Comments
3 min read
Securing Kubernetes Supply Chains with SBOM & Sigstore

Securing Kubernetes Supply Chains with SBOM & Sigstore

Comments
7 min read
Kubernetes Security Checklist for Production (2026)

Kubernetes Security Checklist for Production (2026)

Comments
7 min read
Last week I showed you your AI coding agent can read your SSH keys. Turns out that was the easy part. I run 5 MCP servers con...

Last week I showed you your AI coding agent can read your SSH keys. Turns out that was the easy part. I run 5 MCP servers con...

Comments 1
3 min read
SHAP Explainability for Fraud Ops: What Analysts Actually Need

SHAP Explainability for Fraud Ops: What Analysts Actually Need

Comments
3 min read
The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

Comments
9 min read
504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials

504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.