Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Discordant View: 3 Alternatives to Discord and how we got here...

A Discordant View: 3 Alternatives to Discord and how we got here...

2
Comments
9 min read
Autonomous Agents Need Trustless Infrastructure: How ROFL Enables True Agent Sovereignty

Autonomous Agents Need Trustless Infrastructure: How ROFL Enables True Agent Sovereignty

4
Comments 2
5 min read
7-Layer Constitutional AI Guardrails: Preventing Agent Mistakes

7-Layer Constitutional AI Guardrails: Preventing Agent Mistakes

Comments 1
3 min read
Why Your AI Agent Trusts Too Much — And How to Fix It

Why Your AI Agent Trusts Too Much — And How to Fix It

Comments 1
5 min read
CVE-2025-66803: The Undead Session: Explaining the Race Condition in Hotwired Turbo

CVE-2025-66803: The Undead Session: Explaining the Race Condition in Hotwired Turbo

Comments
2 min read
SwiftUI Security Architecture (Data, Network, UI)

SwiftUI Security Architecture (Data, Network, UI)

Comments
3 min read
CVE-2026-23829: Mailpit Stop: SMTP Header Injection via Regex Failure

CVE-2026-23829: Mailpit Stop: SMTP Header Injection via Regex Failure

Comments
2 min read
Building Skill Align - Part 5 - Field-Level Security, Page Layout Strategy & Lightning Pages
Cover image for Building Skill Align - Part 5 - Field-Level Security, Page Layout Strategy & Lightning Pages

Building Skill Align - Part 5 - Field-Level Security, Page Layout Strategy & Lightning Pages

1
Comments
4 min read
A Practical Guide to Secure 2FA with TOTP
Cover image for A Practical Guide to Secure 2FA with TOTP

A Practical Guide to Secure 2FA with TOTP

4
Comments
9 min read
RFC 6749 Deep Dive: Understanding OAuth 2.0 Design Decisions from the Specification
Cover image for RFC 6749 Deep Dive: Understanding OAuth 2.0 Design Decisions from the Specification

RFC 6749 Deep Dive: Understanding OAuth 2.0 Design Decisions from the Specification

6
Comments
13 min read
🔐 Secure Development Lifecycle (SDL) Explained
Cover image for 🔐 Secure Development Lifecycle (SDL) Explained

🔐 Secure Development Lifecycle (SDL) Explained

Comments
2 min read
🔐 Threat Modeling in DevOps
Cover image for 🔐 Threat Modeling in DevOps

🔐 Threat Modeling in DevOps

Comments
3 min read
SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

1
Comments
1 min read
Does Your App Reveal Its Server Header? You Might Be Helping Attackers
Cover image for Does Your App Reveal Its Server Header? You Might Be Helping Attackers

Does Your App Reveal Its Server Header? You Might Be Helping Attackers

3
Comments
3 min read
SonarQube: SCA Scanning of Unmanaged Dependencies in C/C++ Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in C/C++ Projects with Syft and SBOM Import

Comments 1
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.