Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Subdomain Vulnerabilities Most Developers Don't Know Exist

The Subdomain Vulnerabilities Most Developers Don't Know Exist

Comments
2 min read
Your VPN Might Be Leaking Your Real IP Through WebRTC

Your VPN Might Be Leaking Your Real IP Through WebRTC

Comments
7 min read
I Built an Open-Source AI Firewall Because Every LLM App Leaks Data
Cover image for I Built an Open-Source AI Firewall Because Every LLM App Leaks Data

I Built an Open-Source AI Firewall Because Every LLM App Leaks Data

Comments
4 min read
Lock your dependency to prevent supply-chain attacks
Cover image for Lock your dependency to prevent supply-chain attacks

Lock your dependency to prevent supply-chain attacks

Comments
3 min read
How I Locked Down a Static Site with Lambda@Edge and Cognito (No Backend Required)
Cover image for How I Locked Down a Static Site with Lambda@Edge and Cognito (No Backend Required)

How I Locked Down a Static Site with Lambda@Edge and Cognito (No Backend Required)

1
Comments
7 min read
Why Uploading Your Bank Statement to Random PDF Compressors Is a Financial Privacy Risk

Why Uploading Your Bank Statement to Random PDF Compressors Is a Financial Privacy Risk

Comments
3 min read
The TOCTOU of Trust: Why Agent Registries Know Who Signed Up, Not Who Is Acting

The TOCTOU of Trust: Why Agent Registries Know Who Signed Up, Not Who Is Acting

Comments
5 min read
Prompt injection is not one prompt anymore
Cover image for Prompt injection is not one prompt anymore

Prompt injection is not one prompt anymore

Comments
1 min read
The US government wants to test AI before you use it. That sounds reasonable. It is not.

The US government wants to test AI before you use it. That sounds reasonable. It is not.

Comments
3 min read
North Korea Laptop Farms: Remote Access Infrastructure for IT Worker Fraud
Cover image for North Korea Laptop Farms: Remote Access Infrastructure for IT Worker Fraud

North Korea Laptop Farms: Remote Access Infrastructure for IT Worker Fraud

Comments
6 min read
How to Check If Your Claude Code Installation Is Affected by CVE-2026-39861 (CVSS 7.7)

How to Check If Your Claude Code Installation Is Affected by CVE-2026-39861 (CVSS 7.7)

Comments
3 min read
How to Detect Residential Proxies in Your Application
Cover image for How to Detect Residential Proxies in Your Application

How to Detect Residential Proxies in Your Application

Comments
8 min read
Certificate Transparency Logs: How Attackers Map Your Infrastructure Before You Know They're Looking

Certificate Transparency Logs: How Attackers Map Your Infrastructure Before You Know They're Looking

Comments
6 min read
There Is No “Best” LLM in 2026 — Only Context-Driven Choices

There Is No “Best” LLM in 2026 — Only Context-Driven Choices

1
Comments
4 min read
I shipped a public Apify actor that scans Supabase projects for RLS leaks (took 90 min, found a 895-record leak on the first real test run)

I shipped a public Apify actor that scans Supabase projects for RLS leaks (took 90 min, found a 895-record leak on the first real test run)

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.