Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How we built identity verification for contractors: GPS scoring, revolving QR, and Google Wallet passes
Cover image for How we built identity verification for contractors: GPS scoring, revolving QR, and Google Wallet passes

How we built identity verification for contractors: GPS scoring, revolving QR, and Google Wallet passes

1
Comments
5 min read
The Prompt Injection Crisis: The Silent Security Threat That’s Redefining AI Development in 2026

The Prompt Injection Crisis: The Silent Security Threat That’s Redefining AI Development in 2026

Comments 2
3 min read
Unlocking Control: Dependabot Proxy Goes Open Source for Enhanced Developer Performance
Cover image for Unlocking Control: Dependabot Proxy Goes Open Source for Enhanced Developer Performance

Unlocking Control: Dependabot Proxy Goes Open Source for Enhanced Developer Performance

Comments
4 min read
Security news weekly round-up - 27th March 2026
Cover image for Security news weekly round-up - 27th March 2026

Security news weekly round-up - 27th March 2026

1
Comments 1
3 min read
How to Design OAuth for AI Agents Without Creating a Permission Mess

How to Design OAuth for AI Agents Without Creating a Permission Mess

2
Comments
8 min read
Field Report: Fixing Silent Launch & Permissions for PicoHTTPD Library on macOS Sonoma

Field Report: Fixing Silent Launch & Permissions for PicoHTTPD Library on macOS Sonoma

Comments
4 min read
I Put a Prompt Injection on My Resume

I Put a Prompt Injection on My Resume

5
Comments 1
3 min read
AI Agents are Fragile. Stop your AI Agents from crashing: The 6-Layer Security Mesh

AI Agents are Fragile. Stop your AI Agents from crashing: The 6-Layer Security Mesh

2
Comments 1
3 min read
Stock Market Real-Time Data Analytics Pipeline on AWS
Cover image for Stock Market Real-Time Data Analytics Pipeline on AWS

Stock Market Real-Time Data Analytics Pipeline on AWS

2
Comments
5 min read
Ritual Protocol: a key as an action, not an object
Cover image for Ritual Protocol: a key as an action, not an object

Ritual Protocol: a key as an action, not an object

1
Comments 1
2 min read
Hack The Box Sherlock: GhostTrace Write-up

Hack The Box Sherlock: GhostTrace Write-up

5
Comments
6 min read
Stop Claude Code from leaking your secrets — introducing sensitive-canary

Stop Claude Code from leaking your secrets — introducing sensitive-canary

Comments
3 min read
Hide Any File in Two Images — Browser-Only, No Server
Cover image for Hide Any File in Two Images — Browser-Only, No Server

Hide Any File in Two Images — Browser-Only, No Server

Comments
2 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion
Cover image for Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
Your Cookie Banner Is Probably Breaking GDPR — Here's the 20-Point Audit to Find Out

Your Cookie Banner Is Probably Breaking GDPR — Here's the 20-Point Audit to Find Out

2
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.