Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
OCI IAM Policies Explained: How Authorization Actually Works
Cover image for OCI IAM Policies Explained: How Authorization Actually Works

OCI IAM Policies Explained: How Authorization Actually Works

Comments
3 min read
5 security checks before you ship your vibe-coded app

5 security checks before you ship your vibe-coded app

Comments
7 min read
Most API Breaches Don’t Hack You, They Walk In
Cover image for Most API Breaches Don’t Hack You, They Walk In

Most API Breaches Don’t Hack You, They Walk In

Comments
2 min read
5 Ways Deno Sandbox Changes How You Run Untrusted Code in APIs

5 Ways Deno Sandbox Changes How You Run Untrusted Code in APIs

2
Comments
3 min read
Building Tamper-Evident Audit Trails for AI Trading Systems: A Deep Dive into Cryptographic Logging
Cover image for Building Tamper-Evident Audit Trails for AI Trading Systems: A Deep Dive into Cryptographic Logging

Building Tamper-Evident Audit Trails for AI Trading Systems: A Deep Dive into Cryptographic Logging

Comments
17 min read
I Built a Native macOS Authenticator App Because I Was Tired of Reaching for My Phone
Cover image for I Built a Native macOS Authenticator App Because I Was Tired of Reaching for My Phone

I Built a Native macOS Authenticator App Because I Was Tired of Reaching for My Phone

Comments
6 min read
Designing a Secure Directory Layout for Services That Start as Root and Then Drop Privileges

Designing a Secure Directory Layout for Services That Start as Root and Then Drop Privileges

Comments
6 min read
Enhancing Application Security and Reliability Through Proactive Code Review

Enhancing Application Security and Reliability Through Proactive Code Review

1
Comments
2 min read
🚨 The Rise of Criminal Bounties on Emerging Hiring Platforms (And How Developers Are Being Targeted)
Cover image for 🚨 The Rise of Criminal Bounties on Emerging Hiring Platforms (And How Developers Are Being Targeted)

🚨 The Rise of Criminal Bounties on Emerging Hiring Platforms (And How Developers Are Being Targeted)

2
Comments 7
3 min read
When Chat Turns into Control - Security Lessons from Running a Local AI Agent using OpenClaw
Cover image for When Chat Turns into Control - Security Lessons from Running a Local AI Agent using OpenClaw

When Chat Turns into Control - Security Lessons from Running a Local AI Agent using OpenClaw

Comments
6 min read
x402 V2 Security Deep Dive: New Attack Vectors in AI Agent Payments

x402 V2 Security Deep Dive: New Attack Vectors in AI Agent Payments

1
Comments 1
7 min read
Agentic AI is reintroducing ClickOps

Agentic AI is reintroducing ClickOps

Comments
8 min read
Securing Your LangChain Agent in 5 Minutes with ClawMoat

Securing Your LangChain Agent in 5 Minutes with ClawMoat

1
Comments
4 min read
What is an agent firewall?

What is an agent firewall?

1
Comments
6 min read
OCI Architecture Foundations: How Regions, Domains, and IAM Actually Fit Together
Cover image for OCI Architecture Foundations: How Regions, Domains, and IAM Actually Fit Together

OCI Architecture Foundations: How Regions, Domains, and IAM Actually Fit Together

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.