Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Add Authorization to Your AI Agent (LangChain, CrewAI, OpenAI Agents, and More)
Cover image for How to Add Authorization to Your AI Agent (LangChain, CrewAI, OpenAI Agents, and More)

How to Add Authorization to Your AI Agent (LangChain, CrewAI, OpenAI Agents, and More)

Comments 1
4 min read
The MCP God Key Problem: Why Overprivileged Credentials Are the Next Enterprise Security Crisis

The MCP God Key Problem: Why Overprivileged Credentials Are the Next Enterprise Security Crisis

Comments 1
4 min read
Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

Google's Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed.

2
Comments
21 min read
IAM Auto-Remediation: Enforcing Least Privilege Automatically

IAM Auto-Remediation: Enforcing Least Privilege Automatically

1
Comments 1
4 min read
Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems
Cover image for Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

2
Comments
7 min read
GitLab Behind Cloudflare Tunnel --- Removing Inbound SSH Exposure
Cover image for GitLab Behind Cloudflare Tunnel --- Removing Inbound SSH Exposure

GitLab Behind Cloudflare Tunnel --- Removing Inbound SSH Exposure

2
Comments
4 min read
Why You Need an MCP Gateway for Enterprise AI Agents

Why You Need an MCP Gateway for Enterprise AI Agents

Comments 1
4 min read
How we stopped giving our AI agents raw API keys

How we stopped giving our AI agents raw API keys

1
Comments 4
4 min read
Design-Time Safety: How Fascia's Risk Engine Blocks Unsafe Patterns Before Deployment

Design-Time Safety: How Fascia's Risk Engine Blocks Unsafe Patterns Before Deployment

Comments
2 min read
What's missing from the --dangerously-skip-permissions safety playbook
Cover image for What's missing from the --dangerously-skip-permissions safety playbook

What's missing from the --dangerously-skip-permissions safety playbook

Comments
6 min read
CVE-2025-54136 MCPoison: Why Hosted MCP Servers Have a Smaller Attack Surface

CVE-2025-54136 MCPoison: Why Hosted MCP Servers Have a Smaller Attack Surface

1
Comments 1
4 min read
Open Source Journey: Contributing to OWASP BLT
Cover image for Open Source Journey: Contributing to OWASP BLT

Open Source Journey: Contributing to OWASP BLT

13
Comments 2
3 min read
Most Webhook Signatures Are Broken
Cover image for Most Webhook Signatures Are Broken

Most Webhook Signatures Are Broken

1
Comments
3 min read
Local File Inclusion - Forever CTF (web)

Local File Inclusion - Forever CTF (web)

1
Comments
1 min read
You Built a Network of Snitches

You Built a Network of Snitches

Comments
11 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.