Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI
Cover image for Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Comments
3 min read
Python For Exploit Development
Cover image for Python For Exploit Development

Python For Exploit Development

Comments
7 min read
Creating production-ready authentication and authorization

Creating production-ready authentication and authorization

Comments
3 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
Agent Factory Recap: Can you do my shopping?

Agent Factory Recap: Can you do my shopping?

16
Comments
7 min read
AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

Comments
7 min read
Hands-On: See Image Metadata Removal in Action
Cover image for Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter
Cover image for Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

1
Comments
3 min read
Why Some Android Games Resist NaĂŻve Reverse Engineering

Why Some Android Games Resist NaĂŻve Reverse Engineering

1
Comments 1
5 min read
Splunk | Advent of Cyber 2025 Day 3 Write-Up

Splunk | Advent of Cyber 2025 Day 3 Write-Up

Comments
2 min read
Benchmark Report: Why Most Security Linters Miss 80% of Vulnerabilities
Cover image for Benchmark Report: Why Most Security Linters Miss 80% of Vulnerabilities

Benchmark Report: Why Most Security Linters Miss 80% of Vulnerabilities

Comments
6 min read
How to Test Image Rebuilding API: A Step-by-Step Guide
Cover image for How to Test Image Rebuilding API: A Step-by-Step Guide

How to Test Image Rebuilding API: A Step-by-Step Guide

104
Comments 2
4 min read
Secure Secrets in Google Apps Script

Secure Secrets in Google Apps Script

3
Comments
4 min read
Matrix vs Signal Protocol: Why We Chose NOT to Federate

Matrix vs Signal Protocol: Why We Chose NOT to Federate

Comments
3 min read
Why another exchange architecture post?

Why another exchange architecture post?

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.