Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Rotifer v0.8: Iron Shell — Hardening Before Scaling
Cover image for Rotifer v0.8: Iron Shell — Hardening Before Scaling

Rotifer v0.8: Iron Shell — Hardening Before Scaling

1
Comments
3 min read
AIGoat - AI Security Playground to Attack and Defend LLMs. All Running Locally
Cover image for AIGoat - AI Security Playground to Attack and Defend LLMs. All Running Locally

AIGoat - AI Security Playground to Attack and Defend LLMs. All Running Locally

2
Comments 1
3 min read
The Resolv USR Stablecoin Exploit: How a Compromised Off-Chain Signer Let an Attacker Mint 80M Unbacked Tokens and Steal $25M

The Resolv USR Stablecoin Exploit: How a Compromised Off-Chain Signer Let an Attacker Mint 80M Unbacked Tokens and Steal $25M

Comments
5 min read
I Couldn't Find an OAuth 2.1 Proxy for MCP Servers, So I Built One
Cover image for I Couldn't Find an OAuth 2.1 Proxy for MCP Servers, So I Built One

I Couldn't Find an OAuth 2.1 Proxy for MCP Servers, So I Built One

Comments
3 min read
Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Securing Python Package Management: Strategies to Mitigate Supply Chain Attacks and Ensure Dependency Integrity

Comments
12 min read
I Thought OAuth Was Just Adding a Google Button. Turns Out It's a CSRF Problem Disguised as a Feature.
Cover image for I Thought OAuth Was Just Adding a Google Button. Turns Out It's a CSRF Problem Disguised as a Feature.

I Thought OAuth Was Just Adding a Google Button. Turns Out It's a CSRF Problem Disguised as a Feature.

2
Comments 2
8 min read
Cross-Chain Governance Attacks: How Bridged Voting Power Creates a $2B Attack Surface — And 5 Defense Patterns Every DAO Needs Now

Cross-Chain Governance Attacks: How Bridged Voting Power Creates a $2B Attack Surface — And 5 Defense Patterns Every DAO Needs Now

Comments
8 min read
The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments
Cover image for The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments

The Private Key Problem: Why API Keys Are the Right Abstraction for AI Payments

1
Comments
3 min read
The Math Behind RSA #3: Implementing RSA from Scratch in Python

The Math Behind RSA #3: Implementing RSA from Scratch in Python

Comments
7 min read
Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?
Cover image for Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?

Your AI Agent Just Went Rogue. Do You Know What It's Doing Right Now?

Comments
6 min read
Solana's Noisy Neighbor Attack: How Localized Fee Markets Let Attackers Block Your DeFi Liquidations — And the Detection Toolkit to Stop Them

Solana's Noisy Neighbor Attack: How Localized Fee Markets Let Attackers Block Your DeFi Liquidations — And the Detection Toolkit to Stop Them

1
Comments
6 min read
Add Authentication and SSO to Your Gradio App
Cover image for Add Authentication and SSO to Your Gradio App

Add Authentication and SSO to Your Gradio App

Comments
14 min read
How to Build Access Control Without Passwords, Keys, or Secrets

How to Build Access Control Without Passwords, Keys, or Secrets

Comments
5 min read
Torg Grabber: The 728-Wallet Infostealer Rewriting the Rules of Crypto Endpoint Security

Torg Grabber: The 728-Wallet Infostealer Rewriting the Rules of Crypto Endpoint Security

Comments
7 min read
The TeamPCP Supply Chain Cascade: How One Compromised Security Scanner Led to 3 Million Daily Downloads of Crypto-Stealing Malware

The TeamPCP Supply Chain Cascade: How One Compromised Security Scanner Led to 3 Million Daily Downloads of Crypto-Stealing Malware

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.