Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What actually gets exploited in penetration tests
Cover image for What actually gets exploited in penetration tests

What actually gets exploited in penetration tests

Comments
2 min read
XML-RPC exposure in WordPress: should you disable it before launch?

XML-RPC exposure in WordPress: should you disable it before launch?

Comments
3 min read
I scanned 50 MCP servers to see what they can actually do — here's what I found
Cover image for I scanned 50 MCP servers to see what they can actually do — here's what I found

I scanned 50 MCP servers to see what they can actually do — here's what I found

2
Comments 2
3 min read
Building Honeypots for AI Bots: What Works and What Doesn't

Building Honeypots for AI Bots: What Works and What Doesn't

Comments
2 min read
Why Your Nginx Security Headers Disappear (add_header Inheritance Explained)
Cover image for Why Your Nginx Security Headers Disappear (add_header Inheritance Explained)

Why Your Nginx Security Headers Disappear (add_header Inheritance Explained)

2
Comments
2 min read
How We Detect AI Bots on Our Website: A Technical Deep-Dive

How We Detect AI Bots on Our Website: A Technical Deep-Dive

Comments
2 min read
Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification
Cover image for Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification

Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification

2
Comments
17 min read
When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving
Cover image for When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving

When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving

2
Comments 1
7 min read
Why AI Agents Need Their Own Authorization Protocol (and how we built one)
Cover image for Why AI Agents Need Their Own Authorization Protocol (and how we built one)

Why AI Agents Need Their Own Authorization Protocol (and how we built one)

Comments
6 min read
Building Constant-Time Algorithms: Why It’s Harder Than It Looks
Cover image for Building Constant-Time Algorithms: Why It’s Harder Than It Looks

Building Constant-Time Algorithms: Why It’s Harder Than It Looks

Comments
7 min read
Prompt Worms: How AI Agents Became the New Virus Carriers

Prompt Worms: How AI Agents Became the New Virus Carriers

1
Comments
5 min read
I built an Open-Source CLI that stops your AI terminal from leaking secrets
Cover image for I built an Open-Source CLI that stops your AI terminal from leaking secrets

I built an Open-Source CLI that stops your AI terminal from leaking secrets

Comments
4 min read
5 Common AWS Errors New Developers Hit (And How to Fix Them)
Cover image for 5 Common AWS Errors New Developers Hit (And How to Fix Them)

5 Common AWS Errors New Developers Hit (And How to Fix Them)

17
Comments
12 min read
Building Auditable AI Agents with Conduit

Building Auditable AI Agents with Conduit

1
Comments
4 min read
Trust Is the Substrate, Not the Feature

Trust Is the Substrate, Not the Feature

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.