Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building document authenticity verification as a SaaS API - lessons learned

Building document authenticity verification as a SaaS API - lessons learned

Comments
2 min read
MCP Path Traversal: One Vulnerability, Dozens of Servers

MCP Path Traversal: One Vulnerability, Dozens of Servers

1
Comments
5 min read
pkiwatch-py: Production-Ready TLS/PKI Certificate Monitoring for Enterprise Engineers

pkiwatch-py: Production-Ready TLS/PKI Certificate Monitoring for Enterprise Engineers

Comments
4 min read
How Zod's .refine() Can Cause a Denial of Service — And How to Fix It

How Zod's .refine() Can Cause a Denial of Service — And How to Fix It

Comments
12 min read
3 Auth Bugs We Shipped to Production (Spring + Auth0)

3 Auth Bugs We Shipped to Production (Spring + Auth0)

Comments
4 min read
Hono Has 34M Weekly Downloads and One Maintainer

Hono Has 34M Weekly Downloads and One Maintainer

Comments
3 min read
Extending the Five-Point AI Cyber Defense Strategy

Extending the Five-Point AI Cyber Defense Strategy

Comments
5 min read
Your AI agent is burning tokens, energy, and security. Here's how I made it stop.
Cover image for Your AI agent is burning tokens, energy, and security. Here's how I made it stop.

Your AI agent is burning tokens, energy, and security. Here's how I made it stop.

1
Comments 1
7 min read
How we built a tamper-evident accounting ledger for retail SMBs using SHA-256 hash chaining
Cover image for How we built a tamper-evident accounting ledger for retail SMBs using SHA-256 hash chaining

How we built a tamper-evident accounting ledger for retail SMBs using SHA-256 hash chaining

Comments
2 min read
Prompt Injection Was Stateless. Memory Poisoning Is Persistence
Cover image for Prompt Injection Was Stateless. Memory Poisoning Is Persistence

Prompt Injection Was Stateless. Memory Poisoning Is Persistence

Comments
8 min read
Teks Pegangan

Teks Pegangan

Comments
4 min read
Harvest Now, Decrypt Later Threat

Harvest Now, Decrypt Later Threat

Comments
10 min read
Six Useful Tips to Help ID Spam/Phishing Emails
Cover image for Six Useful Tips to Help ID Spam/Phishing Emails

Six Useful Tips to Help ID Spam/Phishing Emails

Comments
5 min read
I Stress-Tested My Own Security Architecture by Writing a Novel About Breaking It. Here's What I Found.
Cover image for I Stress-Tested My Own Security Architecture by Writing a Novel About Breaking It. Here's What I Found.

I Stress-Tested My Own Security Architecture by Writing a Novel About Breaking It. Here's What I Found.

Comments
6 min read
Why AI Agents Need a Firewall: Introducing Suprawall

Why AI Agents Need a Firewall: Introducing Suprawall

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.