Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Implementing API Keys for Your SaaS: Generation, Hashing, and Validation in Next.js

Implementing API Keys for Your SaaS: Generation, Hashing, and Validation in Next.js

1
Comments
4 min read
How I Replaced LLM-Based Code Analysis with Static Analysis (And Got Better Results)

How I Replaced LLM-Based Code Analysis with Static Analysis (And Got Better Results)

Comments
5 min read
Middleware vs Sidecar: two ways to govern AI agents
Cover image for Middleware vs Sidecar: two ways to govern AI agents

Middleware vs Sidecar: two ways to govern AI agents

1
Comments 2
5 min read
OAuth2 Security Best Practices: 6 Vulnerabilities That Get Apps Breached

OAuth2 Security Best Practices: 6 Vulnerabilities That Get Apps Breached

Comments
4 min read
We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

We Red-Teamed Our Own AI Agent (And It Failed Spectacularly)

1
Comments
10 min read
Bypassing Apple's Anti-Bot Systems: The Ultimate Guide to App Store Scraping
Cover image for Bypassing Apple's Anti-Bot Systems: The Ultimate Guide to App Store Scraping

Bypassing Apple's Anti-Bot Systems: The Ultimate Guide to App Store Scraping

Comments
6 min read
Cisco Just Built Zero Trust for AI Agents. Here's Why That Matters.
Cover image for Cisco Just Built Zero Trust for AI Agents. Here's Why That Matters.

Cisco Just Built Zero Trust for AI Agents. Here's Why That Matters.

1
Comments 1
5 min read
Project Battleship: How I Hardened 28 Docker Containers in a Single Day From a Fifth Wheel RV

Project Battleship: How I Hardened 28 Docker Containers in a Single Day From a Fifth Wheel RV

Comments
4 min read
I Audited My Team's .env Practices. Here's What I Found.

I Audited My Team's .env Practices. Here's What I Found.

Comments 1
4 min read
The MCP Supply Chain Problem: What Happens When You Install a Malicious Server

The MCP Supply Chain Problem: What Happens When You Install a Malicious Server

1
Comments 1
6 min read
MCP Security Checklist: 22 Things to Verify Before Installing Any MCP Server

MCP Security Checklist: 22 Things to Verify Before Installing Any MCP Server

Comments
4 min read
How Zero-Knowledge File Sharing Works: AES-256-GCM in the Browser

How Zero-Knowledge File Sharing Works: AES-256-GCM in the Browser

Comments
2 min read
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Comments
8 min read
Users, Roles, Groups

Users, Roles, Groups

1
Comments 1
2 min read
The Black Market for AI Agents: When Jailbreaking Becomes a Product
Cover image for The Black Market for AI Agents: When Jailbreaking Becomes a Product

The Black Market for AI Agents: When Jailbreaking Becomes a Product

Comments
12 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.