Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous
Cover image for MCP Deep Dive: the Great, the Broken, and the Downright Dangerous

MCP Deep Dive: the Great, the Broken, and the Downright Dangerous

4
Comments
12 min read
🔍📊 Sonar Exporter: Solving SonarQube's Report Export Problem with Next.js
Cover image for 🔍📊 Sonar Exporter: Solving SonarQube's Report Export Problem with Next.js

🔍📊 Sonar Exporter: Solving SonarQube's Report Export Problem with Next.js

4
Comments
3 min read
Memes only a Dev can relate to. (pt.3)

Memes only a Dev can relate to. (pt.3)

Comments
1 min read
I built a privacy-first authentication system at 17 - feedback?

I built a privacy-first authentication system at 17 - feedback?

1
Comments
2 min read
Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)
Cover image for Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

Your AI Integrations Are a Security Nightmare Waiting to Happen (And You Don't Even Know It)

2
Comments
3 min read
The Security Checklist I Use for Every Website I Build
Cover image for The Security Checklist I Use for Every Website I Build

The Security Checklist I Use for Every Website I Build

1
Comments
5 min read
รู้จัก OWASP TOP 10 สำหรับ LLM 10 เรื่องที่ต้องระวัง
Cover image for รู้จัก OWASP TOP 10 สำหรับ LLM 10 เรื่องที่ต้องระวัง

รู้จัก OWASP TOP 10 สำหรับ LLM 10 เรื่องที่ต้องระวัง

Comments
3 min read
🚫 Why use <Navigate/> component instead of useEffect + useNavigate for Protected Routes in React.js

🚫 Why use <Navigate/> component instead of useEffect + useNavigate for Protected Routes in React.js

Comments
1 min read
WAF Checker: False Positive Test

WAF Checker: False Positive Test

Comments
1 min read
How I Hack a Hacker
Cover image for How I Hack a Hacker

How I Hack a Hacker

13
Comments
4 min read
🛡️ Secure Your Tokens the Right Way: BFF + Redis Explained

🛡️ Secure Your Tokens the Right Way: BFF + Redis Explained

1
Comments
3 min read
Cipher's Log: Introduction
Cover image for Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
Complete Guide to AWS KMS: Encryption, Key Management & Serverless Projects

Complete Guide to AWS KMS: Encryption, Key Management & Serverless Projects

12
Comments
1 min read
Building Secure C# Applications: A Comprehensive Guide

Building Secure C# Applications: A Comprehensive Guide

Comments
5 min read
The Risk of Registry Injection Attacks with shadcn
Cover image for The Risk of Registry Injection Attacks with shadcn

The Risk of Registry Injection Attacks with shadcn

11
Comments 1
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.