Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your MCP server's tool descriptions are an attack surface

Your MCP server's tool descriptions are an attack surface

11
Comments 25
6 min read
SSTI Explained: HTB Hacknet Writeup
Cover image for SSTI Explained: HTB Hacknet Writeup

SSTI Explained: HTB Hacknet Writeup

Comments
4 min read
Java Security

Java Security

3
Comments
14 min read
Detect VPN, Proxy and Tor Users in Your Backend

Detect VPN, Proxy and Tor Users in Your Backend

1
Comments
2 min read
Securing Test Environments: How a DevOps Expert Eliminated PII Leaks with Node.js Under Tight Deadlines

Securing Test Environments: How a DevOps Expert Eliminated PII Leaks with Node.js Under Tight Deadlines

Comments
2 min read
Your AI Agent Is One Prompt Injection Away From Losing All Your API Keys

Your AI Agent Is One Prompt Injection Away From Losing All Your API Keys

6
Comments 2
6 min read
GHSA-8X3W-QJ7J-GQHF: The Shortest Path to Failure: Trivial Authentication Bypass in OpenMLS

GHSA-8X3W-QJ7J-GQHF: The Shortest Path to Failure: Trivial Authentication Bypass in OpenMLS

Comments
2 min read
eBPF is Eating Kubernetes Security: Why Every DevOps Engineer Should Care in 2026
Cover image for eBPF is Eating Kubernetes Security: Why Every DevOps Engineer Should Care in 2026

eBPF is Eating Kubernetes Security: Why Every DevOps Engineer Should Care in 2026

Comments
4 min read
Mastering Spam Trap Avoidance on a Zero-Budget Linux Setup

Mastering Spam Trap Avoidance on a Zero-Budget Linux Setup

Comments
3 min read
How I Analyzed $107K Jupiter Lend Before Contest Starts

How I Analyzed $107K Jupiter Lend Before Contest Starts

Comments
3 min read
When Your AI Becomes the Insider
Cover image for When Your AI Becomes the Insider

When Your AI Becomes the Insider

Comments
3 min read
Securing Test Environments: Eliminating PII Leaks with Go

Securing Test Environments: Eliminating PII Leaks with Go

Comments
3 min read
Cloudflare's Toxic Combinations: A Practical Compound-Signal Checklist for Incident Prevention
Cover image for Cloudflare's Toxic Combinations: A Practical Compound-Signal Checklist for Incident Prevention

Cloudflare's Toxic Combinations: A Practical Compound-Signal Checklist for Incident Prevention

2
Comments
5 min read
Passkeys 2026: Adoption Is Exploding — But Access Architecture Still Decides Security

Passkeys 2026: Adoption Is Exploding — But Access Architecture Still Decides Security

2
Comments
3 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

3
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.