Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Runtime Security Isn't Enough — The Case for Memory Integrity

Why Runtime Security Isn't Enough — The Case for Memory Integrity

Comments
4 min read
We Tested Claude Opus 4.6 and Gemini 3 Pro Against 50 Attacks. Both Scored 95/100 — But Failed Differently.

We Tested Claude Opus 4.6 and Gemini 3 Pro Against 50 Attacks. Both Scored 95/100 — But Failed Differently.

Comments
3 min read
Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

1
Comments
6 min read
The gap in AI agent security nobody talks about: your .env is already in the context window

The gap in AI agent security nobody talks about: your .env is already in the context window

13
Comments 19
3 min read
How to secure your firebase app
Cover image for How to secure your firebase app

How to secure your firebase app

Comments
14 min read
The Missing Layer in AI Systems: Verifiable Execution
Cover image for The Missing Layer in AI Systems: Verifiable Execution

The Missing Layer in AI Systems: Verifiable Execution

2
Comments
6 min read
Breaking Down AWS IAM
Cover image for Breaking Down AWS IAM

Breaking Down AWS IAM

Comments
6 min read
5 Self-Hosted WAFs Engineers Are Actually Using in 2026
Cover image for 5 Self-Hosted WAFs Engineers Are Actually Using in 2026

5 Self-Hosted WAFs Engineers Are Actually Using in 2026

1
Comments
4 min read
AlphaOfTech Daily Brief — 2026-02-10

AlphaOfTech Daily Brief — 2026-02-10

Comments
4 min read
mTLS in Service Mesh

mTLS in Service Mesh

1
Comments
8 min read
Some Thoughts on Privacy and Everyday Technology

Some Thoughts on Privacy and Everyday Technology

Comments
2 min read
The Faster We Build with AI, the More Dangerous Bad Auth Becomes - And the Rarer Good Auth Becomes
Cover image for The Faster We Build with AI, the More Dangerous Bad Auth Becomes - And the Rarer Good Auth Becomes

The Faster We Build with AI, the More Dangerous Bad Auth Becomes - And the Rarer Good Auth Becomes

3
Comments 1
10 min read
Proving an MCP Tool Call Happened: A Complete Walkthrough
Cover image for Proving an MCP Tool Call Happened: A Complete Walkthrough

Proving an MCP Tool Call Happened: A Complete Walkthrough

2
Comments
5 min read
Why Privacy Matters in Messaging
Cover image for Why Privacy Matters in Messaging

Why Privacy Matters in Messaging

2
Comments
2 min read
Hardening the Chain: Automating OpenSSF Scorecard for Linux Security 🛡️
Cover image for Hardening the Chain: Automating OpenSSF Scorecard for Linux Security 🛡️

Hardening the Chain: Automating OpenSSF Scorecard for Linux Security 🛡️

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.