Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When AI Agents Talk to Each Other, Who's Listening? Building Inter-Agent Security

When AI Agents Talk to Each Other, Who's Listening? Building Inter-Agent Security

Comments 2
4 min read
Opt-In Safety Is Just Liability Transfer

Opt-In Safety Is Just Liability Transfer

1
Comments 1
4 min read
Your AI Agent Has Root Access to Your Laptop. Here's How to Fix That.

Your AI Agent Has Root Access to Your Laptop. Here's How to Fix That.

Comments 2
3 min read
Mapping AI Infrastructure to the EU AI Act and ISO 42001
Cover image for Mapping AI Infrastructure to the EU AI Act and ISO 42001

Mapping AI Infrastructure to the EU AI Act and ISO 42001

3
Comments
3 min read
How We Architect AI Governance for Real-World Infrastructure
Cover image for How We Architect AI Governance for Real-World Infrastructure

How We Architect AI Governance for Real-World Infrastructure

2
Comments
3 min read
AI-Generated Backends Break in Production. We Replaced Code with Specs.

AI-Generated Backends Break in Production. We Replaced Code with Specs.

Comments 1
3 min read
GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

GHSA-F456-RF33-4626: Mocking the Mock: RCE via Orval Code Generation

Comments
2 min read
Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks
Cover image for Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Passkeys Done Right: The Parts Nobody Mentions Until Something Breaks

Comments
7 min read
Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem

Comments 1
7 min read
AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere
Cover image for AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere

AWS Organizations + IAM Identity Center: The ‘multi-account + access’ combo I use everywhere

3
Comments
4 min read
Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

1
Comments
3 min read
Building a Social Platform with Client-Side End-to-End Encryption

Building a Social Platform with Client-Side End-to-End Encryption

1
Comments 1
9 min read
GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

GHSA-RJR4-V43M-PXQ6: The Lie in the Sponge: Breaking Triton VM's STARKs

Comments
2 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Cover image for Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

5
Comments
10 min read
A Guide to building Advanced MCPs🏗️
Cover image for A Guide to building Advanced MCPs🏗️

A Guide to building Advanced MCPs🏗️

4
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.