Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Traditional QA Fails for AI Agents (And What 10 Years in QA Didn’t Teach Me)
Cover image for Why Traditional QA Fails for AI Agents (And What 10 Years in QA Didn’t Teach Me)

Why Traditional QA Fails for AI Agents (And What 10 Years in QA Didn’t Teach Me)

2
Comments 7
7 min read
How we replaced .env files across 5 microservices without touching the app code

How we replaced .env files across 5 microservices without touching the app code

Comments
3 min read
Logtide 0.6.0: PII Masking, Keyboard Shortcuts & Anomaly Detection
Cover image for Logtide 0.6.0: PII Masking, Keyboard Shortcuts & Anomaly Detection

Logtide 0.6.0: PII Masking, Keyboard Shortcuts & Anomaly Detection

10
Comments 2
4 min read
Skyward Shield: Harnessing Cloud Computing for Next-Gen Disaster Recovery

Skyward Shield: Harnessing Cloud Computing for Next-Gen Disaster Recovery

Comments
2 min read
Binary PDF Modification Detection: How It Works and Where It Fails
Cover image for Binary PDF Modification Detection: How It Works and Where It Fails

Binary PDF Modification Detection: How It Works and Where It Fails

Comments
8 min read
An AI safety researcher's agent deleted her inbox. The fix isn't a better prompt.
Cover image for An AI safety researcher's agent deleted her inbox. The fix isn't a better prompt.

An AI safety researcher's agent deleted her inbox. The fix isn't a better prompt.

1
Comments
6 min read
Exposing Legacy Applications
Cover image for Exposing Legacy Applications

Exposing Legacy Applications

Comments 1
3 min read
Protective Computing Core v1.0 Design Scope and Practical Use
Cover image for Protective Computing Core v1.0 Design Scope and Practical Use

Protective Computing Core v1.0 Design Scope and Practical Use

2
Comments
4 min read
CVE-2026-21852: Premature Exfiltration: How Claude Code Leaked Your Keys Before Asking for Permission

CVE-2026-21852: Premature Exfiltration: How Claude Code Leaked Your Keys Before Asking for Permission

Comments
2 min read
App Groups Are Not Secure by Default - Here's How to Fix That
Cover image for App Groups Are Not Secure by Default - Here's How to Fix That

App Groups Are Not Secure by Default - Here's How to Fix That

1
Comments
9 min read
CVE-2026-23957: Death by Allocation: Crashing Seroval with a Single Byte

CVE-2026-23957: Death by Allocation: Crashing Seroval with a Single Byte

Comments
2 min read
Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?
Cover image for Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?

Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?

7
Comments
9 min read
The Human Fear of Erasure (and Why It Shows Up in Your Systems)
Cover image for The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

2
Comments
4 min read
Native Auditing Architecture: Embedding Traceability Intelligence within the Database Core.

Native Auditing Architecture: Embedding Traceability Intelligence within the Database Core.

Comments
1 min read
Why Stripe Webhook Signature Verification Fails (and When to Stop Debugging)

Why Stripe Webhook Signature Verification Fails (and When to Stop Debugging)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.