Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Leveraging Rust to Prevent Bypassing Gated Content During High Traffic Events

Leveraging Rust to Prevent Bypassing Gated Content During High Traffic Events

Comments
2 min read
Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)
Cover image for Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)

Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)

Comments
4 min read
WebRTC Leaks: Why Even Premium Residential Proxies Are Getting Detected in 2026

WebRTC Leaks: Why Even Premium Residential Proxies Are Getting Detected in 2026

3
Comments 1
11 min read
Can You Break an AI Guardrail? APort Vault Is Open: $6,500 on the Line

Can You Break an AI Guardrail? APort Vault Is Open: $6,500 on the Line

6
Comments
1 min read
How Vue Protects Your App Against Injections
Cover image for How Vue Protects Your App Against Injections

How Vue Protects Your App Against Injections

3
Comments
4 min read
Build a "Military-Grade" Network Scanner in Python (Scapy Tutorial)

Build a "Military-Grade" Network Scanner in Python (Scapy Tutorial)

Comments
3 min read
Securing Legacy Test Environments: Eliminating PII Leaks on Linux

Securing Legacy Test Environments: Eliminating PII Leaks on Linux

Comments
3 min read
39 CVEs in WebGoat. Only 36 Were Reachable.

39 CVEs in WebGoat. Only 36 Were Reachable.

1
Comments
10 min read
Context Planes: Why AI Agents Need Verification Layers (And How They're Getting It Wrong)

Context Planes: Why AI Agents Need Verification Layers (And How They're Getting It Wrong)

Comments 2
5 min read
Add Secure Password Generation to Your App
Cover image for Add Secure Password Generation to Your App

Add Secure Password Generation to Your App

Comments
5 min read
How to Detect VPN and Proxy Users
Cover image for How to Detect VPN and Proxy Users

How to Detect VPN and Proxy Users

Comments
6 min read
Your Best Employee is Your Biggest Security Risk (And They Use ChatGPT)
Cover image for Your Best Employee is Your Biggest Security Risk (And They Use ChatGPT)

Your Best Employee is Your Biggest Security Risk (And They Use ChatGPT)

135
Comments 2
3 min read
Simplified Role-Based Access Control with CASL.js

Simplified Role-Based Access Control with CASL.js

5
Comments 2
3 min read
How I Built a Physical Kill-Switch for CI/CD Pipelines to Stop SolarWinds-Style Attacks

How I Built a Physical Kill-Switch for CI/CD Pipelines to Stop SolarWinds-Style Attacks

Comments
13 min read
Building an End-to-End Encrypted Journal: My First Steps Toward Privacy-First AI
Cover image for Building an End-to-End Encrypted Journal: My First Steps Toward Privacy-First AI

Building an End-to-End Encrypted Journal: My First Steps Toward Privacy-First AI

3
Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.