Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Rebuilding TLS, Part 2 — Adding Integrity to the Channel
Cover image for Rebuilding TLS, Part 2 — Adding Integrity to the Channel

Rebuilding TLS, Part 2 — Adding Integrity to the Channel

Comments
17 min read
AWS Frontier Agents: What $50/Hour Pen Testing and $30/Hour SRE Means for Platform Teams

AWS Frontier Agents: What $50/Hour Pen Testing and $30/Hour SRE Means for Platform Teams

Comments
4 min read
The Axios Breach Started with a Plaintext Token — Here's How I Keep Zero Secrets in My Repos
Cover image for The Axios Breach Started with a Plaintext Token — Here's How I Keep Zero Secrets in My Repos

The Axios Breach Started with a Plaintext Token — Here's How I Keep Zero Secrets in My Repos

Comments
5 min read
Paste your package.json, see which dependencies are CRITICAL supply chain risks

Paste your package.json, see which dependencies are CRITICAL supply chain risks

Comments
2 min read
FastAPI + MCP: Adding Real OAuth 2.1 Auth to Your Python MCP Server

FastAPI + MCP: Adding Real OAuth 2.1 Auth to Your Python MCP Server

Comments 1
9 min read
The Claude Code Leak Changed the Threat Model. Here's How to Defend Your AI Agents.

The Claude Code Leak Changed the Threat Model. Here's How to Defend Your AI Agents.

Comments
11 min read
Every agent trust proposal is building the wrong thing

Every agent trust proposal is building the wrong thing

Comments
3 min read
Why We Built a Local-First iPhone Authenticator Instead of Another Cloud-Synced 2FA App

Why We Built a Local-First iPhone Authenticator Instead of Another Cloud-Synced 2FA App

Comments
1 min read
Why Most “Anonymous” Tools Aren’t Actually Anonymous (And What to Look for Instead)

Why Most “Anonymous” Tools Aren’t Actually Anonymous (And What to Look for Instead)

Comments
3 min read
HTTP/3 Fingerprints: Identifying Clients in the QUIC Era
Cover image for HTTP/3 Fingerprints: Identifying Clients in the QUIC Era

HTTP/3 Fingerprints: Identifying Clients in the QUIC Era

1
Comments
3 min read
Row Level Security Is Not Optional: How I Locked Down a Multi-Tenant Supabase App

Row Level Security Is Not Optional: How I Locked Down a Multi-Tenant Supabase App

Comments
2 min read
Azure Kubernetes Security: Checklist and Best Practices
Cover image for Azure Kubernetes Security: Checklist and Best Practices

Azure Kubernetes Security: Checklist and Best Practices

1
Comments
3 min read
Why agent RBAC is broken in most CLI frameworks (and how to fix it)

Why agent RBAC is broken in most CLI frameworks (and how to fix it)

Comments
4 min read
I Thought JWTs Were Stateless. Turns Out Logout Made Me Build a Stateful Layer Anyway.
Cover image for I Thought JWTs Were Stateless. Turns Out Logout Made Me Build a Stateful Layer Anyway.

I Thought JWTs Were Stateless. Turns Out Logout Made Me Build a Stateful Layer Anyway.

2
Comments
8 min read
Lainux -- The Secure OS for AI Builders

Lainux -- The Secure OS for AI Builders

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.