Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time
Cover image for I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time

I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time

Comments
7 min read
🚀 Identity Verification in FlutterFlow using uqudo SDK

🚀 Identity Verification in FlutterFlow using uqudo SDK

Comments
2 min read
AI is a Non-Deterministic Guest in a Deterministic House: Stop Building Chatbots, Start Building Sandboxes
Cover image for AI is a Non-Deterministic Guest in a Deterministic House: Stop Building Chatbots, Start Building Sandboxes

AI is a Non-Deterministic Guest in a Deterministic House: Stop Building Chatbots, Start Building Sandboxes

1
Comments
4 min read
macOS Clipboard History — What Gets Logged, What Leaks, and How to Audit It
Cover image for macOS Clipboard History — What Gets Logged, What Leaks, and How to Audit It

macOS Clipboard History — What Gets Logged, What Leaks, and How to Audit It

Comments
9 min read
MCP Action Chaining: The Attack Your Permissions Can't See

MCP Action Chaining: The Attack Your Permissions Can't See

1
Comments
5 min read
I audited 25 top npm packages with a zero-install CLI. Here's who passes.

I audited 25 top npm packages with a zero-install CLI. Here's who passes.

1
Comments
4 min read
🔐 Implementing Least‑Privilege Access in Amazon EKS Using Kubernetes RBAC
Cover image for 🔐 Implementing Least‑Privilege Access in Amazon EKS Using Kubernetes RBAC

🔐 Implementing Least‑Privilege Access in Amazon EKS Using Kubernetes RBAC

Comments
8 min read
The Governance Gap Is Already Measured

The Governance Gap Is Already Measured

Comments
3 min read
Building E2E in the Browser: The Hardest Problem No One Talks About

Building E2E in the Browser: The Hardest Problem No One Talks About

1
Comments 1
2 min read
How to Compute Zero Trust Effectiveness: Four Metrics That Survive a Breach
Cover image for How to Compute Zero Trust Effectiveness: Four Metrics That Survive a Breach

How to Compute Zero Trust Effectiveness: Four Metrics That Survive a Breach

Comments
5 min read
Build Secure Systems While Coding (A Practical Dev Story You Shouldn’t Ignore)
Cover image for Build Secure Systems While Coding (A Practical Dev Story You Shouldn’t Ignore)

Build Secure Systems While Coding (A Practical Dev Story You Shouldn’t Ignore)

1
Comments
7 min read
Why File Type Detection Is More Than a Metadata Problem
Cover image for Why File Type Detection Is More Than a Metadata Problem

Why File Type Detection Is More Than a Metadata Problem

Comments 1
10 min read
Why Security Teams Should Own AI Red-Teaming

Why Security Teams Should Own AI Red-Teaming

Comments
4 min read
Why I Stopped Relying on WAF Alone (And Added an API Firewall)

Why I Stopped Relying on WAF Alone (And Added an API Firewall)

Comments
11 min read
How I Built a Real-Time DDoS Detection Engine from Scratch

How I Built a Real-Time DDoS Detection Engine from Scratch

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.