Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

1
Comments
2 min read
From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive
Cover image for From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive

From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive

2
Comments
12 min read
From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack
Cover image for From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack

From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack

2
Comments
6 min read
How to Make Your OpenClaw Agent Call Any API Without Exposing Your Keys

How to Make Your OpenClaw Agent Call Any API Without Exposing Your Keys

6
Comments
5 min read
CVE-2026-24132: CVE-2026-24132: Orval's Mock Generator Did What You Told It To (And That's The Problem)

CVE-2026-24132: CVE-2026-24132: Orval's Mock Generator Did What You Told It To (And That's The Problem)

Comments
2 min read
HTTPS Isn’t Optional, It’s the Boundary of Your System
Cover image for HTTPS Isn’t Optional, It’s the Boundary of Your System

HTTPS Isn’t Optional, It’s the Boundary of Your System

Comments
2 min read
How to Secure Your CI/CD Pipeline End-to-End (With Real Tools)

How to Secure Your CI/CD Pipeline End-to-End (With Real Tools)

1
Comments 1
3 min read
The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

3
Comments 1
13 min read
Field Guide v0.1 What is inside and where to start

Field Guide v0.1 What is inside and where to start

Comments
2 min read
⚙️ Persistent Threat Via Environment Vars
Cover image for ⚙️ Persistent Threat Via Environment Vars

⚙️ Persistent Threat Via Environment Vars

Comments
6 min read
We Ran a Verifiable Agent-to-Agent Payment. Here's Exactly How.

We Ran a Verifiable Agent-to-Agent Payment. Here's Exactly How.

4
Comments
4 min read
Webhook Security Best Practices for Production 2025-2026
Cover image for Webhook Security Best Practices for Production 2025-2026

Webhook Security Best Practices for Production 2025-2026

1
Comments
7 min read
Why We Keep Blaming Prompts Instead of Architecture
Cover image for Why We Keep Blaming Prompts Instead of Architecture

Why We Keep Blaming Prompts Instead of Architecture

1
Comments 1
3 min read
Week 7 Scripting Challenge: JWT Token Validation

Week 7 Scripting Challenge: JWT Token Validation

3
Comments
21 min read
CVE-2025-22234: The 73rd Byte: How a Spring Security Fix Created a Timing Leak

CVE-2025-22234: The 73rd Byte: How a Spring Security Fix Created a Timing Leak

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.