Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring

Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring

Comments
7 min read
Security by Default: Keeping Code Local and Safe

Security by Default: Keeping Code Local and Safe

Comments
3 min read
You've probably never heard of these npm packages. They're in your production app.

You've probably never heard of these npm packages. They're in your production app.

Comments
3 min read
How Hackers Are Bypassing cPanel 2FA and What You Must Do Now
Cover image for How Hackers Are Bypassing cPanel 2FA and What You Must Do Now

How Hackers Are Bypassing cPanel 2FA and What You Must Do Now

1
Comments
6 min read
Linux Root Exploit (CVE-2026-31431), SAP npm Supply Chain Attack, & Homelab Secrets with Infisical

Linux Root Exploit (CVE-2026-31431), SAP npm Supply Chain Attack, & Homelab Secrets with Infisical

Comments
2 min read
How npm Behavioral Risk Scoring Works: The Methodology Behind getcommit.dev

How npm Behavioral Risk Scoring Works: The Methodology Behind getcommit.dev

Comments
9 min read
SSL Certificate Decoder: How to Read and Analyze Any Certificate
Cover image for SSL Certificate Decoder: How to Read and Analyze Any Certificate

SSL Certificate Decoder: How to Read and Analyze Any Certificate

Comments
2 min read
I Run AI Agents With Full System Access. Here's What Makes It Safe Enough.

I Run AI Agents With Full System Access. Here's What Makes It Safe Enough.

Comments
5 min read
We Built the Missing Trust Layer for AI Agent Payments

We Built the Missing Trust Layer for AI Agent Payments

Comments
8 min read
Inside a2a-acl — a drop-in Express library for agent-to-agent authorization
Cover image for Inside a2a-acl — a drop-in Express library for agent-to-agent authorization

Inside a2a-acl — a drop-in Express library for agent-to-agent authorization

Comments
6 min read
I Built an Evil Twin Attack in 15 Minutes — Here's What I Learned About Public Wi-Fi
Cover image for I Built an Evil Twin Attack in 15 Minutes — Here's What I Learned About Public Wi-Fi

I Built an Evil Twin Attack in 15 Minutes — Here's What I Learned About Public Wi-Fi

Comments
5 min read
The "All Green" Trap: Why Your Intuition is Now a Vulnerability.

The "All Green" Trap: Why Your Intuition is Now a Vulnerability.

Comments
1 min read
The MCP SDK Looks Safe. Its Supply Chain Has 11 CRITICAL Single-Maintainer Packages.

The MCP SDK Looks Safe. Its Supply Chain Has 11 CRITICAL Single-Maintainer Packages.

Comments
4 min read
When Security Asks Permission So Often You Stop Reading

When Security Asks Permission So Often You Stop Reading

Comments
6 min read
Benchmark Scores Are the New SOC2

Benchmark Scores Are the New SOC2

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.