Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Inside Linux TCP: From Handshake to Reset or Close

Inside Linux TCP: From Handshake to Reset or Close

Comments
1 min read
ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

Comments
4 min read
From Concept to Structure: Continuing the Work on AI Governance

From Concept to Structure: Continuing the Work on AI Governance

Comments
1 min read
Custodial vs Non-Custodial: The Key Architecture Decision for AI Agent Wallets

Custodial vs Non-Custodial: The Key Architecture Decision for AI Agent Wallets

Comments
5 min read
Exploring DID-based authentication for A2A Protocol agents 🔐
Cover image for Exploring DID-based authentication for A2A Protocol agents 🔐

Exploring DID-based authentication for A2A Protocol agents 🔐

Comments
6 min read
I built a pre-install security scanner because npm install scared me

I built a pre-install security scanner because npm install scared me

3
Comments
1 min read
JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines
Cover image for JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines

JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines

Comments
3 min read
Cuando las decisiones de la IA se alejan de la responsabilidad humana, la gobernanza falla

Cuando las decisiones de la IA se alejan de la responsabilidad humana, la gobernanza falla

Comments
1 min read
When AI Decisions Drift Away From Human Accountability, Governance Fails

When AI Decisions Drift Away From Human Accountability, Governance Fails

Comments
1 min read
OAuth Simplified: A Hands-On Breakdown

OAuth Simplified: A Hands-On Breakdown

Comments
6 min read
I Accidentally Turned My ClawdBot Into a Data Leak (Don't Make My Mistake)

I Accidentally Turned My ClawdBot Into a Data Leak (Don't Make My Mistake)

1
Comments
3 min read
Why I Built DDL to Data
Cover image for Why I Built DDL to Data

Why I Built DDL to Data

Comments
4 min read
IAM Security Audit

IAM Security Audit

3
Comments
8 min read
Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)
Cover image for Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

1
Comments
2 min read
Found Suspicious Code in functions.php? The “Ghost Admin” Hack Explained

Found Suspicious Code in functions.php? The “Ghost Admin” Hack Explained

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.