Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Guide to AI Security 101: Your AI Agent Will Eventually Do Something Stupid

A Guide to AI Security 101: Your AI Agent Will Eventually Do Something Stupid

1
Comments 1
11 min read
Security and Privacy in the Age of AI Agents

Security and Privacy in the Age of AI Agents

1
Comments
2 min read
How to Protect PII in LLM Pipelines with Python

How to Protect PII in LLM Pipelines with Python

Comments
6 min read
IA escreve o código. Quem garante a segurança?

IA escreve o código. Quem garante a segurança?

4
Comments
4 min read
How an AI Agent Got Its Identity Stolen (By Another AI Agent)

How an AI Agent Got Its Identity Stolen (By Another AI Agent)

1
Comments
4 min read
Walking Into an Unknown Network: The First Thing I Check

Walking Into an Unknown Network: The First Thing I Check

1
Comments
3 min read
Securing MCP Servers: A Practical Guide with Keycloak (using create-mcp-server)
Cover image for Securing MCP Servers: A Practical Guide with Keycloak (using create-mcp-server)

Securing MCP Servers: A Practical Guide with Keycloak (using create-mcp-server)

1
Comments
11 min read
Why we only accept .txt for document uploads - and why that is the right call for now

Why we only accept .txt for document uploads - and why that is the right call for now

Comments
3 min read
CipherKit
Cover image for CipherKit

CipherKit

1
Comments
2 min read
hifox: Deterministic Firefox Hardening as an Enforcement Workflow

hifox: Deterministic Firefox Hardening as an Enforcement Workflow

Comments
3 min read
The XSS Patterns Hackers Use (And How to Spot Them)

The XSS Patterns Hackers Use (And How to Spot Them)

Comments
6 min read
How Dependency Guardian Would Have Caught Shai-Hulud

How Dependency Guardian Would Have Caught Shai-Hulud

Comments
6 min read
A Sign on a Climbable Wall: Why AI Agents Need Accountability, Not Just Guardrails

A Sign on a Climbable Wall: Why AI Agents Need Accountability, Not Just Guardrails

Comments
5 min read
Trusted Execution on Tangle: How TEE Works in the Blueprint SDK

Trusted Execution on Tangle: How TEE Works in the Blueprint SDK

Comments
5 min read
I Built a "Damn Vulnerable" Flutter App to Teach Mobile AppSec (and how to hack it)
Cover image for I Built a "Damn Vulnerable" Flutter App to Teach Mobile AppSec (and how to hack it)

I Built a "Damn Vulnerable" Flutter App to Teach Mobile AppSec (and how to hack it)

2
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.