Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How we built zero-knowledge PDF sharing in the browser
Cover image for How we built zero-knowledge PDF sharing in the browser

How we built zero-knowledge PDF sharing in the browser

Comments
2 min read
How We Use Ed25519 Signatures to Give Users Cryptographic Proof Before They Send Crypto
Cover image for How We Use Ed25519 Signatures to Give Users Cryptographic Proof Before They Send Crypto

How We Use Ed25519 Signatures to Give Users Cryptographic Proof Before They Send Crypto

1
Comments
5 min read
Stop Processing Duplicate Webhooks: Idempotency & Security in Laravel 🛡️
Cover image for Stop Processing Duplicate Webhooks: Idempotency & Security in Laravel 🛡️

Stop Processing Duplicate Webhooks: Idempotency & Security in Laravel 🛡️

Comments
3 min read
Is Your jQuery Version a Security Risk?
Cover image for Is Your jQuery Version a Security Risk?

Is Your jQuery Version a Security Risk?

Comments
4 min read
Vercel's April 2026 Breach Was an OAuth Supply-Chain Attack

Vercel's April 2026 Breach Was an OAuth Supply-Chain Attack

Comments
7 min read
Securing MCP in Production: PII Redaction, Guardrails, and Data Exfiltration Prevention
Cover image for Securing MCP in Production: PII Redaction, Guardrails, and Data Exfiltration Prevention

Securing MCP in Production: PII Redaction, Guardrails, and Data Exfiltration Prevention

Comments
4 min read
# How North Korea Poisoned the npm Package You Use Every Day: The Axios Supply Chain Attack (2026)
Cover image for # How North Korea Poisoned the npm Package You Use Every Day: The Axios Supply Chain Attack (2026)

# How North Korea Poisoned the npm Package You Use Every Day: The Axios Supply Chain Attack (2026)

Comments
8 min read
SAML - Single Sgn On

SAML - Single Sgn On

Comments
2 min read
Inside SENTINEL: How 13 Microservices Detect Child Grooming by Behavior, Not Keywords

Inside SENTINEL: How 13 Microservices Detect Child Grooming by Behavior, Not Keywords

Comments
6 min read
I leaked my GH token to Claude

I leaked my GH token to Claude

Comments
2 min read
How I Built a Secure File Transfer App with Django, ClamAV, and Cloudflare R2
Cover image for How I Built a Secure File Transfer App with Django, ClamAV, and Cloudflare R2

How I Built a Secure File Transfer App with Django, ClamAV, and Cloudflare R2

Comments
2 min read
Auth migrations break on session strategy, not login screens
Cover image for Auth migrations break on session strategy, not login screens

Auth migrations break on session strategy, not login screens

Comments
9 min read
Introducing hapi-aegis: Helmet-style security headers for hapi.js

Introducing hapi-aegis: Helmet-style security headers for hapi.js

Comments
3 min read
nukon-pi-detect: a tiny, offline prompt-injection scanner for CI pipelines

nukon-pi-detect: a tiny, offline prompt-injection scanner for CI pipelines

Comments
1 min read
Application Web

Application Web

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.