Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Comments 1
7 min read
AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere
Cover image for AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere

AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere

3
Comments
4 min read
Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

1
Comments
3 min read
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
Building a Social Platform with Client-Side End-to-End Encryption

Building a Social Platform with Client-Side End-to-End Encryption

1
Comments 1
9 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Cover image for Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

5
Comments
10 min read
A Guide to building Advanced MCPs🏗️
Cover image for A Guide to building Advanced MCPs🏗️

A Guide to building Advanced MCPs🏗️

4
Comments
2 min read
7 Prompt Injection Attacks That Work on Most AI Chatbots (And How to Block Them)

7 Prompt Injection Attacks That Work on Most AI Chatbots (And How to Block Them)

Comments 1
4 min read
Verification Theater vs. Real Trust: Why Attestation Alone Isn't Enough for TEE-Based Systems

Verification Theater vs. Real Trust: Why Attestation Alone Isn't Enough for TEE-Based Systems

4
Comments 2
5 min read
Assumptions Do
Cover image for Assumptions Do

Assumptions Do

1
Comments
9 min read
Memory Safety Guarantees in Rust

Memory Safety Guarantees in Rust

Comments
8 min read
Building a Secure Enterprise Developer Workspace on AWS

Building a Secure Enterprise Developer Workspace on AWS

Comments
9 min read
How I Prevented CSV Injection Attacks in a QR Batch Generator (And Why You Should Care)
Cover image for How I Prevented CSV Injection Attacks in a QR Batch Generator (And Why You Should Care)

How I Prevented CSV Injection Attacks in a QR Batch Generator (And Why You Should Care)

Comments
5 min read
Stopping Hidden Threats: AI Safety in PDF Processing
Cover image for Stopping Hidden Threats: AI Safety in PDF Processing

Stopping Hidden Threats: AI Safety in PDF Processing

Comments
2 min read
Understanding Prompt Injection Attacks

Understanding Prompt Injection Attacks

1
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.