Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The MCP Security Problem Nobody Is Solving

The MCP Security Problem Nobody Is Solving

Comments
6 min read
Vienna OS vs Guardrails AI: Execution Control vs Output Filtering

Vienna OS vs Guardrails AI: Execution Control vs Output Filtering

Comments
3 min read
I built an IAM-style firewall for AI agents after Claude read my .env
Cover image for I built an IAM-style firewall for AI agents after Claude read my .env

I built an IAM-style firewall for AI agents after Claude read my .env

1
Comments
4 min read
5 AI Agent Disasters That Could Have Been Prevented

5 AI Agent Disasters That Could Have Been Prevented

Comments
4 min read
The Masked Truth: When Mathematical Rigor Becomes Marketing in Modern Protocols
Cover image for The Masked Truth: When Mathematical Rigor Becomes Marketing in Modern Protocols

The Masked Truth: When Mathematical Rigor Becomes Marketing in Modern Protocols

1
Comments
4 min read
I Built a Production-Ready Biometric Auth Microservice. Here Are 5 Problems Nobody Warns You About.
Cover image for I Built a Production-Ready Biometric Auth Microservice. Here Are 5 Problems Nobody Warns You About.

I Built a Production-Ready Biometric Auth Microservice. Here Are 5 Problems Nobody Warns You About.

1
Comments
7 min read
Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Comments
6 min read
The Prompt Injection Crisis: The Silent Security Threat That’s Redefining AI Development in 2026

The Prompt Injection Crisis: The Silent Security Threat That’s Redefining AI Development in 2026

Comments
3 min read
Hack The Box Sherlock: GhostTrace Write-up

Hack The Box Sherlock: GhostTrace Write-up

4
Comments
6 min read
We Scanned 50 MCP Servers for Security Flaws - Here's What We Found

We Scanned 50 MCP Servers for Security Flaws - Here's What We Found

Comments
2 min read
The Venus Protocol Donation Attack: How a Dismissed Audit Finding Became a $2.15M Bad Debt — Twice

The Venus Protocol Donation Attack: How a Dismissed Audit Finding Became a $2.15M Bad Debt — Twice

1
Comments
5 min read
LangChain Just Got Three CVEs. The Bugs Are From 2006.
Cover image for LangChain Just Got Three CVEs. The Bugs Are From 2006.

LangChain Just Got Three CVEs. The Bugs Are From 2006.

1
Comments
6 min read
The LiteLLM Fork Bomb Was an Accident. That's the Scary Part.

The LiteLLM Fork Bomb Was an Accident. That's the Scary Part.

Comments
5 min read
RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models
Cover image for RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models

RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models

2
Comments 1
15 min read
Flash Loan Circuit Breakers: 5 On-Chain Defense Patterns That Would Have Stopped 80% of Q1 2026's $137M in DeFi Exploits

Flash Loan Circuit Breakers: 5 On-Chain Defense Patterns That Would Have Stopped 80% of Q1 2026's $137M in DeFi Exploits

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.