Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CAP Security & Authorization — XSUAA, @restrict & Multi-Tenant Auth

CAP Security & Authorization — XSUAA, @restrict & Multi-Tenant Auth

Comments
5 min read
We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.
Cover image for We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.

We compared security in OpenClaw, Claude Code, and Cursor. None of them passed.

Comments
8 min read
API Security Testing Automation: Building Comprehensive Testing Pipelines That Actually Catch Vulnerabilities

API Security Testing Automation: Building Comprehensive Testing Pipelines That Actually Catch Vulnerabilities

Comments
20 min read
The TeamPCP Supply Chain Campaign: How Compromised Security Tools Are Draining Crypto Wallets — A DeFi Developer's Defense Playbook

The TeamPCP Supply Chain Campaign: How Compromised Security Tools Are Draining Crypto Wallets — A DeFi Developer's Defense Playbook

Comments
8 min read
Don't Lose Your IP Through Your MCP

Don't Lose Your IP Through Your MCP

Comments
12 min read
Why I stopped using CAPTCHAs and built a behavioral API instead

Why I stopped using CAPTCHAs and built a behavioral API instead

3
Comments
2 min read
Stop deploying your AI agents raw. (A quick security PSA)
Cover image for Stop deploying your AI agents raw. (A quick security PSA)

Stop deploying your AI agents raw. (A quick security PSA)

Comments 1
1 min read
🗝️ Public/Private Keys Explained Like You're 5

🗝️ Public/Private Keys Explained Like You're 5

1
Comments 1
1 min read
The Line Between Research and Surveillance Is Gone
Cover image for The Line Between Research and Surveillance Is Gone

The Line Between Research and Surveillance Is Gone

2
Comments
6 min read
EtherRAT: How North Korean Hackers Weaponized Ethereum Smart Contracts Into an Unkillable Command Server That Steals Your Crypto

EtherRAT: How North Korean Hackers Weaponized Ethereum Smart Contracts Into an Unkillable Command Server That Steals Your Crypto

Comments
5 min read
Approaches to code reviews

Approaches to code reviews

Comments
6 min read
I Audited a Claude Code Plugin That Reads All Your Browser Cookies
Cover image for I Audited a Claude Code Plugin That Reads All Your Browser Cookies

I Audited a Claude Code Plugin That Reads All Your Browser Cookies

Comments
2 min read
The Aave CAPO Oracle Meltdown: How a 2.85% Price Error Triggered $27M in Liquidations

The Aave CAPO Oracle Meltdown: How a 2.85% Price Error Triggered $27M in Liquidations

Comments
6 min read
The Four Layers of Hook Perception: Why Your AI Guardrails Aren't Actually Working

The Four Layers of Hook Perception: Why Your AI Guardrails Aren't Actually Working

Comments
9 min read
The $1,808 Governance Heist: How an Attacker Nearly Drained $1M From Moonwell

The $1,808 Governance Heist: How an Attacker Nearly Drained $1M From Moonwell

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.