Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification
Cover image for Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification

Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification

2
Comments
17 min read
When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving
Cover image for When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving

When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving

2
Comments 1
7 min read
Why AI Agents Need Their Own Authorization Protocol (and how we built one)
Cover image for Why AI Agents Need Their Own Authorization Protocol (and how we built one)

Why AI Agents Need Their Own Authorization Protocol (and how we built one)

Comments
6 min read
Building Constant-Time Algorithms: Why It’s Harder Than It Looks
Cover image for Building Constant-Time Algorithms: Why It’s Harder Than It Looks

Building Constant-Time Algorithms: Why It’s Harder Than It Looks

Comments
7 min read
Prompt Worms: How AI Agents Became the New Virus Carriers

Prompt Worms: How AI Agents Became the New Virus Carriers

1
Comments
5 min read
One request looks clean. Five requests leak your AWS key.

One request looks clean. Five requests leak your AWS key.

Comments
5 min read
5 Common AWS Errors New Developers Hit (And How to Fix Them)
Cover image for 5 Common AWS Errors New Developers Hit (And How to Fix Them)

5 Common AWS Errors New Developers Hit (And How to Fix Them)

17
Comments
12 min read
I built an Open-Source CLI that stops your AI terminal from leaking secrets
Cover image for I built an Open-Source CLI that stops your AI terminal from leaking secrets

I built an Open-Source CLI that stops your AI terminal from leaking secrets

Comments
4 min read
Day 38 of #100DaysOfCode — Authentication Part II: JWT
Cover image for Day 38 of #100DaysOfCode — Authentication Part II: JWT

Day 38 of #100DaysOfCode — Authentication Part II: JWT

4
Comments
3 min read
Building Auditable AI Agents with Conduit

Building Auditable AI Agents with Conduit

1
Comments
4 min read
Trust Is the Substrate, Not the Feature

Trust Is the Substrate, Not the Feature

Comments
4 min read
Your .env Files Are a Security Incident Waiting to Happen

Your .env Files Are a Security Incident Waiting to Happen

Comments
3 min read
MD5 vs SHA-1 vs SHA-256: A Developer's Guide to Hash Functions

MD5 vs SHA-1 vs SHA-256: A Developer's Guide to Hash Functions

Comments
4 min read
How I Built a Prompt Injection Detection API with 42 Patterns (and What I Learned)

How I Built a Prompt Injection Detection API with 42 Patterns (and What I Learned)

1
Comments
2 min read
SSH SOCKS5 Proxy in 2026: macOS, Linux, Windows & sshuttle: Complete Guide
Cover image for SSH SOCKS5 Proxy in 2026: macOS, Linux, Windows & sshuttle: Complete Guide

SSH SOCKS5 Proxy in 2026: macOS, Linux, Windows & sshuttle: Complete Guide

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.