Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Linux Hardening Scripts: Linux Server Security Guide

Linux Hardening Scripts: Linux Server Security Guide

Comments
7 min read
This open-source tool scans uploads before they become a problem
Cover image for This open-source tool scans uploads before they become a problem

This open-source tool scans uploads before they become a problem

Comments
3 min read
CanisterWorm: How a Self-Propagating npm Worm Uses Blockchain C2 to Wipe Kubernetes Clusters

CanisterWorm: How a Self-Propagating npm Worm Uses Blockchain C2 to Wipe Kubernetes Clusters

Comments
6 min read
robots.txt is a sign, not a fence: 8 technical vectors through which AI still reads your website

robots.txt is a sign, not a fence: 8 technical vectors through which AI still reads your website

Comments
4 min read
Building Safer Email OTP Verification in Node.js: Expiry, Retries, and Lockouts

Building Safer Email OTP Verification in Node.js: Expiry, Retries, and Lockouts

Comments
5 min read
The Resolv Hack Autopsy: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

The Resolv Hack Autopsy: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

Comments
7 min read
I scanned 100 AI-generated apps for security vulnerabilities. Here's what I found.

I scanned 100 AI-generated apps for security vulnerabilities. Here's what I found.

3
Comments
3 min read
Building a Transfer Hook Exploit Scanner: Automated Detection of CPI Depth Bombs and Callback Reentrancy in Solana Token-2022

Building a Transfer Hook Exploit Scanner: Automated Detection of CPI Depth Bombs and Callback Reentrancy in Solana Token-2022

Comments
6 min read
You probably haven't audited your MCP servers or AI agent skills. This tool does it for you.
Cover image for You probably haven't audited your MCP servers or AI agent skills. This tool does it for you.

You probably haven't audited your MCP servers or AI agent skills. This tool does it for you.

1
Comments 1
2 min read
I Scanned Random Lovable Projects for Security Flaws. Here's What I Found.

I Scanned Random Lovable Projects for Security Flaws. Here's What I Found.

Comments
2 min read
Container Security Toolkit: Container Security Guide

Container Security Toolkit: Container Security Guide

Comments
5 min read
The LiteLLM Supply Chain Attack: A Wake-Up Call for AI Infrastructure

The LiteLLM Supply Chain Attack: A Wake-Up Call for AI Infrastructure

21
Comments
6 min read
Privacy-First Analytics for Crypto

Privacy-First Analytics for Crypto

Comments
7 min read
How Formo Uses Subresource Integrity (SRI) to Protect Your Users

How Formo Uses Subresource Integrity (SRI) to Protect Your Users

Comments
7 min read
Securing MCP Servers: The 2026 Guide to AI Tool Tunneling

Securing MCP Servers: The 2026 Guide to AI Tool Tunneling

1
Comments
11 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.