Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
An AI safety researcher's agent deleted her inbox. The fix isn't a better prompt.
Cover image for An AI safety researcher's agent deleted her inbox. The fix isn't a better prompt.

An AI safety researcher's agent deleted her inbox. The fix isn't a better prompt.

1
Comments
6 min read
Binary PDF Modification Detection: How It Works and Where It Fails
Cover image for Binary PDF Modification Detection: How It Works and Where It Fails

Binary PDF Modification Detection: How It Works and Where It Fails

Comments
8 min read
Exposing Legacy Applications
Cover image for Exposing Legacy Applications

Exposing Legacy Applications

Comments 1
3 min read
Protective Computing Core v1.0 Design Scope and Practical Use
Cover image for Protective Computing Core v1.0 Design Scope and Practical Use

Protective Computing Core v1.0 Design Scope and Practical Use

2
Comments
4 min read
App Groups Are Not Secure by Default - Here's How to Fix That
Cover image for App Groups Are Not Secure by Default - Here's How to Fix That

App Groups Are Not Secure by Default - Here's How to Fix That

1
Comments
9 min read
CVE-2026-21852: Premature Exfiltration: How Claude Code Leaked Your Keys Before Asking for Permission

CVE-2026-21852: Premature Exfiltration: How Claude Code Leaked Your Keys Before Asking for Permission

Comments
2 min read
CVE-2026-23957: Death by Allocation: Crashing Seroval with a Single Byte

CVE-2026-23957: Death by Allocation: Crashing Seroval with a Single Byte

Comments
2 min read
Is TLS Enough? A Retrospective on Application-Layer Encryption
Cover image for Is TLS Enough? A Retrospective on Application-Layer Encryption

Is TLS Enough? A Retrospective on Application-Layer Encryption

Comments
2 min read
Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?
Cover image for Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?

Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?

7
Comments
9 min read
Why Stripe Webhook Signature Verification Fails (and When to Stop Debugging)

Why Stripe Webhook Signature Verification Fails (and When to Stop Debugging)

Comments
2 min read
Native Auditing Architecture: Embedding Traceability Intelligence within the Database Core.

Native Auditing Architecture: Embedding Traceability Intelligence within the Database Core.

Comments
1 min read
Death by Yes

Death by Yes

5
Comments
5 min read
CVE-2026-23886: CVE-2026-23886: The Case of the Fatal Uppercase

CVE-2026-23886: CVE-2026-23886: The Case of the Fatal Uppercase

Comments
2 min read
Introducing graphql-complexity-validation

Introducing graphql-complexity-validation

1
Comments
1 min read
CVE-2026-23947: Comment Injection to RCE: Breaking Orval with JSDoc

CVE-2026-23947: Comment Injection to RCE: Breaking Orval with JSDoc

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.