Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
5 Best Practices for Securing Amazon SageMaker.
Cover image for 5 Best Practices for Securing Amazon SageMaker.

5 Best Practices for Securing Amazon SageMaker.

1
Comments
3 min read
You Built a Network of Snitches

You Built a Network of Snitches

Comments
11 min read
Convenience is eating security: why “one-click agents” need a stop button
Cover image for Convenience is eating security: why “one-click agents” need a stop button

Convenience is eating security: why “one-click agents” need a stop button

Comments
2 min read
myanon — how I anonymize 200GB of MySQL nightly for GDPR-safe dev

myanon — how I anonymize 200GB of MySQL nightly for GDPR-safe dev

Comments
1 min read
Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock
Cover image for Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Comments
13 min read
Prompting Is Making Humans Boom Scroll. Here’s How to Ship Agent Apps Safely
Cover image for Prompting Is Making Humans Boom Scroll. Here’s How to Ship Agent Apps Safely

Prompting Is Making Humans Boom Scroll. Here’s How to Ship Agent Apps Safely

1
Comments
12 min read
Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)
Cover image for Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)

Calling a Public API Gateway Custom Domain from a Private VPC (Without Reconfiguring Your Clients)

Comments
4 min read
Deep Dive into VeraSnap: Building a Cryptographic Evidence Camera with Hash Chains, Hardware Signatures, and the VAP Framework
Cover image for Deep Dive into VeraSnap: Building a Cryptographic Evidence Camera with Hash Chains, Hardware Signatures, and the VAP Framework

Deep Dive into VeraSnap: Building a Cryptographic Evidence Camera with Hash Chains, Hardware Signatures, and the VAP Framework

Comments
11 min read
CVE-2026-24771: Hono ErrorBoundary: When the Safety Net is the Trap

CVE-2026-24771: Hono ErrorBoundary: When the Safety Net is the Trap

Comments
2 min read
HSTS: the security header everyone forgets (until it quietly matters)

HSTS: the security header everyone forgets (until it quietly matters)

5
Comments
1 min read
CVE-2026-24739: The Equalizer: How a Single Character Deleted Your Drive

CVE-2026-24739: The Equalizer: How a Single Character Deleted Your Drive

Comments
2 min read
From Prompts to Programs: The Promise and Problem of AI-Generated Code
Cover image for From Prompts to Programs: The Promise and Problem of AI-Generated Code

From Prompts to Programs: The Promise and Problem of AI-Generated Code

Comments
3 min read
🛡️ Securing Clawdbot (Moltbot): Essential Hardening for AI Agents with System Access
Cover image for 🛡️ Securing Clawdbot (Moltbot): Essential Hardening for AI Agents with System Access

🛡️ Securing Clawdbot (Moltbot): Essential Hardening for AI Agents with System Access

Comments
3 min read
Request to Participate and Share Academic Survey on Code Review in OSS Security

Request to Participate and Share Academic Survey on Code Review in OSS Security

Comments
1 min read
GHSA-GPX9-96J6-PP87: The Call Is Coming From Inside The Container: TaskWeaver's Docker Escape

GHSA-GPX9-96J6-PP87: The Call Is Coming From Inside The Container: TaskWeaver's Docker Escape

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.