Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Right Way to Deploy Private GitHub Repos to Your VPS

The Right Way to Deploy Private GitHub Repos to Your VPS

Comments
7 min read
Safe Remote Server Reboot Guide
Cover image for Safe Remote Server Reboot Guide

Safe Remote Server Reboot Guide

Comments
3 min read
The Singleton Design Pattern: A Complete Guide for Developers
Cover image for The Singleton Design Pattern: A Complete Guide for Developers

The Singleton Design Pattern: A Complete Guide for Developers

1
Comments
5 min read
Reducing False Positives in XSS Detection: Designing Confirmation-Based Scanners
Cover image for Reducing False Positives in XSS Detection: Designing Confirmation-Based Scanners

Reducing False Positives in XSS Detection: Designing Confirmation-Based Scanners

Comments
3 min read
What Is Static Code Analysis and How Does It Work

What Is Static Code Analysis and How Does It Work

12
Comments
18 min read
BCOS: Why Open Source Needs a Human Trust Layer in the AI Agent Era

BCOS: Why Open Source Needs a Human Trust Layer in the AI Agent Era

1
Comments
5 min read
The Night I Almost Lost Everything: A Guide to Stopping Reentrancy Attacks
Cover image for The Night I Almost Lost Everything: A Guide to Stopping Reentrancy Attacks

The Night I Almost Lost Everything: A Guide to Stopping Reentrancy Attacks

Comments
2 min read
RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS
Cover image for RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS

RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS

3
Comments 1
21 min read
Fixing MariaDB ERROR 2002 (HY000): TLS Handshake Fails with “Host Is Not Allowed to Connect”

Fixing MariaDB ERROR 2002 (HY000): TLS Handshake Fails with “Host Is Not Allowed to Connect”

Comments
3 min read
Maintaining truthful docs over time: how to keep security claims honest

Maintaining truthful docs over time: how to keep security claims honest

1
Comments
4 min read
Stop Using .env Files for AI Agents: A Zero-Trust Blueprint

Stop Using .env Files for AI Agents: A Zero-Trust Blueprint

6
Comments
3 min read
CVE-2026-24009: YAML Deserialization: The Gift That Keeps on Giving in Docling-Core

CVE-2026-24009: YAML Deserialization: The Gift That Keeps on Giving in Docling-Core

Comments
2 min read
Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint
Cover image for Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint

Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint

Comments
11 min read
The killer’s signature wasn’t on the weapon, it was in the code.
Cover image for The killer’s signature wasn’t on the weapon, it was in the code.

The killer’s signature wasn’t on the weapon, it was in the code.

1
Comments 3
1 min read
AI Agents Lost $600K+ to Prompt Injection — Attack Taxonomy & Code-Level Defenses

AI Agents Lost $600K+ to Prompt Injection — Attack Taxonomy & Code-Level Defenses

2
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.