Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Supply Chain Security for Developers: Protecting Your CI/CD Pipeline in 2026

Supply Chain Security for Developers: Protecting Your CI/CD Pipeline in 2026

Comments
6 min read
The Confused Deputy Problem in Solana CPIs: 5 Patterns That Get Programs Drained

The Confused Deputy Problem in Solana CPIs: 5 Patterns That Get Programs Drained

Comments
5 min read
Stop AI Agents from Leaking PII

Stop AI Agents from Leaking PII

3
Comments 5
1 min read
EVMbench and the Arms Race: How AI Agents Are Rewriting Smart Contract Security — And What Defenders Must Do Now

EVMbench and the Arms Race: How AI Agents Are Rewriting Smart Contract Security — And What Defenders Must Do Now

Comments
4 min read
Let Humans Write. Let AI Critique -- A Manifesto for Security Engineers

Let Humans Write. Let AI Critique -- A Manifesto for Security Engineers

1
Comments 1
8 min read
World ID Verification: Prove Your Humanity, Anonymously

World ID Verification: Prove Your Humanity, Anonymously

Comments
2 min read
AWS PrivateLink - Acceso a Instancias EC2 Privadas a través de VPC endpoints y Systems Manager (en español sencillo)

AWS PrivateLink - Acceso a Instancias EC2 Privadas a través de VPC endpoints y Systems Manager (en español sencillo)

Comments
5 min read
Deposit Inflation Attacks: How One Bug Pattern Drained $4.5M Across Four Protocols in March 2026

Deposit Inflation Attacks: How One Bug Pattern Drained $4.5M Across Four Protocols in March 2026

Comments
1 min read
How We Built Process-Tree Agent Detection

How We Built Process-Tree Agent Detection

Comments
7 min read
Production MLOps Security: From Model Poisoning to Inference Attacks in 2026

Production MLOps Security: From Model Poisoning to Inference Attacks in 2026

Comments 1
6 min read
I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)
Cover image for I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)

I Fine-Tuned a Security Reasoning Model That Runs on a 4GB Laptop (No GPU, No Cloud)

3
Comments
5 min read
The Transient Storage Trap: Why EIP-1153 Gas Savings Are Creating a New Generation of Smart Contract Vulnerabilities

The Transient Storage Trap: Why EIP-1153 Gas Savings Are Creating a New Generation of Smart Contract Vulnerabilities

Comments
4 min read
DarkSword: The Zero-Click iOS Exploit Chain That's Draining Crypto Wallets in Under 60 Seconds

DarkSword: The Zero-Click iOS Exploit Chain That's Draining Crypto Wallets in Under 60 Seconds

Comments
6 min read
The Noisy Neighbor Attack: How Solana's Localized Fee Markets Create a $0.50 Kill Switch for Any DeFi Protocol

The Noisy Neighbor Attack: How Solana's Localized Fee Markets Create a $0.50 Kill Switch for Any DeFi Protocol

Comments
7 min read
Differential Testing for DeFi Protocol Forks: A Foundry Framework That Would Have Caught $50M in Exploits

Differential Testing for DeFi Protocol Forks: A Foundry Framework That Would Have Caught $50M in Exploits

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.