Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Combining direnv and dotenvx-rs: A Configuration Pattern for Automatic Loading and Encryption
Cover image for Combining direnv and dotenvx-rs: A Configuration Pattern for Automatic Loading and Encryption

Combining direnv and dotenvx-rs: A Configuration Pattern for Automatic Loading and Encryption

1
Comments
6 min read
Robin: Investigating the Dark Web with AI - A New Companion for Security Researchers
Cover image for Robin: Investigating the Dark Web with AI - A New Companion for Security Researchers

Robin: Investigating the Dark Web with AI - A New Companion for Security Researchers

Comments
6 min read
Stop uploading sensitive PDFs to random websites

Stop uploading sensitive PDFs to random websites

Comments
2 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Hackers Rob. Security Reads the Manual.
Cover image for Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)
Cover image for Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)

Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)

1
Comments
4 min read
Why I stopped using online JSON formatters (and built my own)

Why I stopped using online JSON formatters (and built my own)

1
Comments
2 min read
Commit Signing - GnuPG Agent Forwarding

Commit Signing - GnuPG Agent Forwarding

Comments
2 min read
How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution
Cover image for How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution

How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution

Comments
3 min read
Data Security Simplified: Building Your HIPAA-Compliant Data Lake on AWS

Data Security Simplified: Building Your HIPAA-Compliant Data Lake on AWS

Comments
3 min read
Building EncroGram: A Messenger Where Servers Can't Read Your Messages

Building EncroGram: A Messenger Where Servers Can't Read Your Messages

Comments
2 min read
Riding the Hype: Security Audit of AI Agent Clawdbot
Cover image for Riding the Hype: Security Audit of AI Agent Clawdbot

Riding the Hype: Security Audit of AI Agent Clawdbot

1
Comments 3
9 min read
Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java
Cover image for Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java

Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java

1
Comments
3 min read
😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)
Cover image for 😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)

😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)

Comments 1
3 min read
Your Teams Are Already Vibe Coding. Here's How to Capture the Value.
Cover image for Your Teams Are Already Vibe Coding. Here's How to Capture the Value.

Your Teams Are Already Vibe Coding. Here's How to Capture the Value.

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.