Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🚀 Built ScreenGuard Pro — a real-time screen privacy tool

🚀 Built ScreenGuard Pro — a real-time screen privacy tool

Comments
1 min read
🚨 Understanding Threat Intelligence: From Raw Data to Meaningful Insights

🚨 Understanding Threat Intelligence: From Raw Data to Meaningful Insights

Comments
2 min read
Securing AI agent actions on blockchain: two complementary models
Cover image for Securing AI agent actions on blockchain: two complementary models

Securing AI agent actions on blockchain: two complementary models

Comments
2 min read
Math.random() Non-Compliant with NIST 800-63B: Adopt Cryptographically Secure Random Number Generators

Math.random() Non-Compliant with NIST 800-63B: Adopt Cryptographically Secure Random Number Generators

Comments
7 min read
Ghidra Skills: Finding Logic Bombs in MIPS-based Router Firmware
Cover image for Ghidra Skills: Finding Logic Bombs in MIPS-based Router Firmware

Ghidra Skills: Finding Logic Bombs in MIPS-based Router Firmware

1
Comments
6 min read
StackSentry Is Now Installable — And We Need You to Break It
Cover image for StackSentry Is Now Installable — And We Need You to Break It

StackSentry Is Now Installable — And We Need You to Break It

Comments
1 min read
The API Key is Dead: A Blueprint for Agent Identity in the age of MCP

The API Key is Dead: A Blueprint for Agent Identity in the age of MCP

1
Comments
34 min read
Audit any GitHub repo's supply chain risk with one API call

Audit any GitHub repo's supply chain risk with one API call

Comments
2 min read
63% of orgs can't enforce what their AI agents are allowed to do

63% of orgs can't enforce what their AI agents are allowed to do

1
Comments 2
3 min read
Hims Breach: Exploiting Telehealth PHI for Extortion & Identity Fraud
Cover image for Hims Breach: Exploiting Telehealth PHI for Extortion & Identity Fraud

Hims Breach: Exploiting Telehealth PHI for Extortion & Identity Fraud

Comments
6 min read
Cert-gating every tool call: zero-trust for AI agents

Cert-gating every tool call: zero-trust for AI agents

Comments
9 min read
NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

NomShub: How to Check If Your Mac Was Affected by the Cursor Sandbox Escape

Comments
5 min read
How to add human approval to MCP tool calls — no code changes

How to add human approval to MCP tool calls — no code changes

Comments
3 min read
How to Prove Compliance in AI-Generated Code

How to Prove Compliance in AI-Generated Code

Comments
4 min read
OpenOS — Web4 Human Identity Protocol

OpenOS — Web4 Human Identity Protocol

2
Comments
20 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.