Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building Zero-Trust API Authentication in 2026: Beyond JWT

Building Zero-Trust API Authentication in 2026: Beyond JWT

Comments
6 min read
Secure Passwords, Tokens, and Data Masking in Python - A Toolkit for the AI Era
Cover image for Secure Passwords, Tokens, and Data Masking in Python - A Toolkit for the AI Era

Secure Passwords, Tokens, and Data Masking in Python - A Toolkit for the AI Era

Comments
4 min read
Your AI Just Hardcoded Your Stripe Key. Here's Why It Keeps Happening.

Your AI Just Hardcoded Your Stripe Key. Here's Why It Keeps Happening.

Comments
3 min read
Signature Replay Across L2s: How One Permit2 Signature Can Drain Your Tokens on Every Chain Simultaneously

Signature Replay Across L2s: How One Permit2 Signature Can Drain Your Tokens on Every Chain Simultaneously

Comments
6 min read
Security Vulnerabilities Every Developer Should Know (OWASP Top 10 Simplified)

Security Vulnerabilities Every Developer Should Know (OWASP Top 10 Simplified)

Comments
5 min read
State of MCP Security 2026: We Scanned 15,923 AI Tools. Here's What We Found.

State of MCP Security 2026: We Scanned 15,923 AI Tools. Here's What We Found.

Comments
3 min read
How I Implemented Logout From One Device and All Devices in My Auth System
Cover image for How I Implemented Logout From One Device and All Devices in My Auth System

How I Implemented Logout From One Device and All Devices in My Auth System

Comments
4 min read
Mutation Testing for Smart Contracts: How Slither-Mutate + Foundry Reveals the Tests You Forgot to Write

Mutation Testing for Smart Contracts: How Slither-Mutate + Foundry Reveals the Tests You Forgot to Write

Comments
5 min read
Why AI Agents Need Verifiable Identity

Why AI Agents Need Verifiable Identity

Comments
6 min read
The First 60 Minutes After a DeFi Exploit: A Battle-Tested Incident Response Playbook for 2026

The First 60 Minutes After a DeFi Exploit: A Battle-Tested Incident Response Playbook for 2026

1
Comments
7 min read
A VC-Backed Startup Just Open-Sourced What I Built in My Apartment

A VC-Backed Startup Just Open-Sourced What I Built in My Apartment

Comments
3 min read
How to Set Up Passwordless SSH Login with PuTTY.
Cover image for How to Set Up Passwordless SSH Login with PuTTY.

How to Set Up Passwordless SSH Login with PuTTY.

6
Comments
2 min read
Building Authentication Without Collecting Any Personal Data

Building Authentication Without Collecting Any Personal Data

1
Comments
5 min read
The Security Crisis Hiding Inside Machine Identities

The Security Crisis Hiding Inside Machine Identities

1
Comments
5 min read
I let an AI agent loose on my codebase. It tried to read my .env file in 30 seconds.
Cover image for I let an AI agent loose on my codebase. It tried to read my .env file in 30 seconds.

I let an AI agent loose on my codebase. It tried to read my .env file in 30 seconds.

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.