Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Governance Timelock Bypass: 6 Attack Patterns and How to Design Them Out

Governance Timelock Bypass: 6 Attack Patterns and How to Design Them Out

Comments
6 min read
I Built a Free Supply Chain Scanner After Watching Hermes-Agent Get Infected

I Built a Free Supply Chain Scanner After Watching Hermes-Agent Get Infected

1
Comments
4 min read
Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

1
Comments
6 min read
Blockchain as C2 Infrastructure: Dissecting the Windsurf IDE Supply Chain Attack That Weaponized Solana

Blockchain as C2 Infrastructure: Dissecting the Windsurf IDE Supply Chain Attack That Weaponized Solana

Comments
4 min read
Modernizing Kubernetes Image Promoter: Enhancing Performance and Features Without Disruption

Modernizing Kubernetes Image Promoter: Enhancing Performance and Features Without Disruption

Comments
7 min read
The Air-Gapped Chronicles: The Insurance Gap — Building Liability-Resistant AI When Insurance Won't Cover the Risk

The Air-Gapped Chronicles: The Insurance Gap — Building Liability-Resistant AI When Insurance Won't Cover the Risk

Comments
6 min read
Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.
Cover image for Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.

Compliance Reports Are Not Compliance. The Difference Will Define the Next Era of Trust.

Comments
6 min read
How I Built a Fake Admin Detection System for Telegram Web3 Communities
Cover image for How I Built a Fake Admin Detection System for Telegram Web3 Communities

How I Built a Fake Admin Detection System for Telegram Web3 Communities

1
Comments
1 min read
5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit

5 Cloud Compliance Mistakes Startups Make Before Their First SOC 2 Audit

1
Comments
2 min read
Simulation-Execution Divergence: The Systemic Risk Threatening Every ERC-4337 Bundler

Simulation-Execution Divergence: The Systemic Risk Threatening Every ERC-4337 Bundler

1
Comments
6 min read
Auditing Browser Extensions That Touch Your Crypto: A Practical Toolkit After ShieldGuard and Coruna

Auditing Browser Extensions That Touch Your Crypto: A Practical Toolkit After ShieldGuard and Coruna

Comments
8 min read
3 MCP Security Gateways Launched This Week. None of Them Do Pre-Action Authorization.

3 MCP Security Gateways Launched This Week. None of Them Do Pre-Action Authorization.

Comments
5 min read
I Built a Python Recon Toolkit and It Exposed My Own Server

I Built a Python Recon Toolkit and It Exposed My Own Server

1
Comments
3 min read
How to Detect Credential Stuffing Attacks in Your Nginx Logs

How to Detect Credential Stuffing Attacks in Your Nginx Logs

Comments
3 min read
Trivy Scanner Compromised Again: Malicious Code Found in v0.69.4 and GitHub Actions, Raising Security Concerns

Trivy Scanner Compromised Again: Malicious Code Found in v0.69.4 and GitHub Actions, Raising Security Concerns

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.