Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
LiteLLM PyPI Supply Chain Compromise: How a Popular LLM Proxy Became a Credential-Stealing Backdoor

LiteLLM PyPI Supply Chain Compromise: How a Popular LLM Proxy Became a Credential-Stealing Backdoor

1
Comments
4 min read
API Authentication Done Right: JWTs, API Keys, and OAuth2 in Production (2026 Guide)

API Authentication Done Right: JWTs, API Keys, and OAuth2 in Production (2026 Guide)

1
Comments
3 min read
Security by Default: Keeping Code Local with Orquesta

Security by Default: Keeping Code Local with Orquesta

Comments
3 min read
AI System's Internal Logic Exposed via Creative Querying: Enhanced Access Restrictions Proposed

AI System's Internal Logic Exposed via Creative Querying: Enhanced Access Restrictions Proposed

Comments
13 min read
We Scanned 5,618 MCP Servers for Security Vulnerabilities — Here's What We Found

We Scanned 5,618 MCP Servers for Security Vulnerabilities — Here's What We Found

Comments
5 min read
WebSocket Authentication: Securing Real-Time Connections

WebSocket Authentication: Securing Real-Time Connections

1
Comments
1 min read
EU AI Act Compliance for AI Agents: What Developers Need to Know

EU AI Act Compliance for AI Agents: What Developers Need to Know

Comments
2 min read
The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

Comments
6 min read
The $274/5min Bot Attack: Protecting Next.js with Docker & Redis
Cover image for The $274/5min Bot Attack: Protecting Next.js with Docker & Redis

The $274/5min Bot Attack: Protecting Next.js with Docker & Redis

1
Comments
5 min read
How to Remove EXIF Data from Photos (Privacy Guide)

How to Remove EXIF Data from Photos (Privacy Guide)

1
Comments
6 min read
We built runtime threat detection for AI agents — here's what we found after monitoring 1M+ agent calls

We built runtime threat detection for AI agents — here's what we found after monitoring 1M+ agent calls

Comments
3 min read
The Forum Post

The Forum Post

Comments
5 min read
My cursor-generated app had security issues. It scored 0 out of 100.

My cursor-generated app had security issues. It scored 0 out of 100.

Comments
1 min read
The Window

The Window

Comments
5 min read
Designing a Hardware-Bound License Server for Embedded Linux Devices (Part 1: Server Architecture)

Designing a Hardware-Bound License Server for Embedded Linux Devices (Part 1: Server Architecture)

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.