Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
RSC Is Not the Input Boundary
Cover image for RSC Is Not the Input Boundary

RSC Is Not the Input Boundary

1
Comments
13 min read
9 Open-Source Tools to Own Your Stack (and Kill Your Cloud Bills) in 2026
Cover image for 9 Open-Source Tools to Own Your Stack (and Kill Your Cloud Bills) in 2026

9 Open-Source Tools to Own Your Stack (and Kill Your Cloud Bills) in 2026

Comments
7 min read
AI-generated code: almost right is still risky

AI-generated code: almost right is still risky

Comments
2 min read
How to Add SSO to Your AI-Coded Internal App (OIDC Guide)

How to Add SSO to Your AI-Coded Internal App (OIDC Guide)

Comments
12 min read
TealTiger v1.2: 7 Governance Modules, Docker Sidecar, and Honest Benchmark Results
Cover image for TealTiger v1.2: 7 Governance Modules, Docker Sidecar, and Honest Benchmark Results

TealTiger v1.2: 7 Governance Modules, Docker Sidecar, and Honest Benchmark Results

Comments
4 min read
Agent Identity Is Not Enough

Agent Identity Is Not Enough

Comments
5 min read
How Password Managers Actually Protect Your Data

How Password Managers Actually Protect Your Data

Comments
5 min read
Stop Trusting LLMs with Calldata: Architecting a Mathematical Cage for Web3 Agents
Cover image for Stop Trusting LLMs with Calldata: Architecting a Mathematical Cage for Web3 Agents

Stop Trusting LLMs with Calldata: Architecting a Mathematical Cage for Web3 Agents

1
Comments
4 min read
Sample Secured Cloud Architecture
Cover image for Sample Secured Cloud Architecture

Sample Secured Cloud Architecture

Comments
1 min read
AWS Account Security Restricted? Here's My 56-Hour Unblock Journey
Cover image for AWS Account Security Restricted? Here's My 56-Hour Unblock Journey

AWS Account Security Restricted? Here's My 56-Hour Unblock Journey

Comments
6 min read
The Silent Heist: How Cryptojackers Stole Millions Without Anyone Noticing

The Silent Heist: How Cryptojackers Stole Millions Without Anyone Noticing

Comments
8 min read
Why Developers Trust AI Code More Than They Should
Cover image for Why Developers Trust AI Code More Than They Should

Why Developers Trust AI Code More Than They Should

1
Comments
2 min read
tRPC and Remix 3: The Security Flaw in benchmark for Scalability

tRPC and Remix 3: The Security Flaw in benchmark for Scalability

Comments
3 min read
Google OAuth 2.0 PKCE flow in a React/Next.js app — no backend, no client secret
Cover image for Google OAuth 2.0 PKCE flow in a React/Next.js app — no backend, no client secret

Google OAuth 2.0 PKCE flow in a React/Next.js app — no backend, no client secret

7
Comments
8 min read
Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor

Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.