Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
RSAC 2026 Just Shipped Four New Agent Security Models. None of Them Solve Identity Portability.

RSAC 2026 Just Shipped Four New Agent Security Models. None of Them Solve Identity Portability.

Comments
3 min read
Environment Variables Done Right: Stop Hardcoding Secrets in 2026

Environment Variables Done Right: Stop Hardcoding Secrets in 2026

1
Comments
2 min read
Claude Code CLI Vulnerability: Malicious Configs Bypass Trust Dialog, Enabling Unauthorized Permission Elevation

Claude Code CLI Vulnerability: Malicious Configs Bypass Trust Dialog, Enabling Unauthorized Permission Elevation

Comments
10 min read
VoltAgent Just Asked Us to Build Their Guardrail Provider Interface. Here Is What We Shipped.

VoltAgent Just Asked Us to Build Their Guardrail Provider Interface. Here Is What We Shipped.

Comments
3 min read
Donation Attacks on Compound-Fork Lending Protocols: Dissecting the Venus Protocol THE Exploit

Donation Attacks on Compound-Fork Lending Protocols: Dissecting the Venus Protocol THE Exploit

Comments
7 min read
Evidence Stores for Supply Chain Security
Cover image for Evidence Stores for Supply Chain Security

Evidence Stores for Supply Chain Security

Comments
3 min read
Lessons From Processing Millions of Telegram Messages: What We Learned About Spam
Cover image for Lessons From Processing Millions of Telegram Messages: What We Learned About Spam

Lessons From Processing Millions of Telegram Messages: What We Learned About Spam

1
Comments
3 min read
The Anchor Constraint Security Checklist: 10 Validation Patterns That Prevent 90% of Solana Program Exploits

The Anchor Constraint Security Checklist: 10 Validation Patterns That Prevent 90% of Solana Program Exploits

Comments
6 min read
You Can’t Secure Public APIs — You Can Only Control Them

You Can’t Secure Public APIs — You Can Only Control Them

1
Comments
2 min read
Auditing Inherited Code: How to Detect Fork-Inherited Vulnerabilities Before They Become $7M Exploits

Auditing Inherited Code: How to Detect Fork-Inherited Vulnerabilities Before They Become $7M Exploits

Comments
8 min read
How Do You Build a HIPAA-Compliant API in 2026 for Secure Healthcare Applications?
Cover image for How Do You Build a HIPAA-Compliant API in 2026 for Secure Healthcare Applications?

How Do You Build a HIPAA-Compliant API in 2026 for Secure Healthcare Applications?

4
Comments
11 min read
1Password Just Launched Unified Access with Anthropic, Cursor, and Vercel. Credential Vaults Are Not Identity.

1Password Just Launched Unified Access with Anthropic, Cursor, and Vercel. Credential Vaults Are Not Identity.

Comments
4 min read
MEV-Resistant Smart Contract Design: 5 Battle-Tested Patterns After the $50M Aave Slippage Catastrophe

MEV-Resistant Smart Contract Design: 5 Battle-Tested Patterns After the $50M Aave Slippage Catastrophe

Comments
6 min read
Claude Code CLI Fixed: Configuration Loading Order Defect Resolved to Prevent Unauthorized Permission Elevation

Claude Code CLI Fixed: Configuration Loading Order Defect Resolved to Prevent Unauthorized Permission Elevation

Comments
8 min read
Building a Governance MCP Server for AI Agents

Building a Governance MCP Server for AI Agents

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.