Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
TOCTOU of Trust: Why Agent Governance Must Be Continuous

TOCTOU of Trust: Why Agent Governance Must Be Continuous

1
Comments
8 min read
I Built the Middleware Layer MCP is Missing
Cover image for I Built the Middleware Layer MCP is Missing

I Built the Middleware Layer MCP is Missing

Comments
3 min read
Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)
Cover image for Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Comments
4 min read
Cursor Keeps Writing IDOR Into Your APIs. Here's the Fix.
Cover image for Cursor Keeps Writing IDOR Into Your APIs. Here's the Fix.

Cursor Keeps Writing IDOR Into Your APIs. Here's the Fix.

4
Comments
3 min read
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Comments
3 min read
Your AI Security Problem Starts Before the Prompt
Cover image for Your AI Security Problem Starts Before the Prompt

Your AI Security Problem Starts Before the Prompt

Comments
8 min read
Vaultic: WebAuthn Authentication for Laravel – The Death of Passwords
Cover image for Vaultic: WebAuthn Authentication for Laravel – The Death of Passwords

Vaultic: WebAuthn Authentication for Laravel – The Death of Passwords

Comments
5 min read
Cloudflare and GitHub are building identity systems for AI agents. We're not ready for this.

Cloudflare and GitHub are building identity systems for AI agents. We're not ready for this.

Comments
3 min read
TOCTOU of Trust: Why Agent Governance Must Be Continuous

TOCTOU of Trust: Why Agent Governance Must Be Continuous

1
Comments
8 min read
Mythos y GPT-5.4-Cyber: la ventana de 80 dĂ­as de exposiciĂłn va a crecer
Cover image for Mythos y GPT-5.4-Cyber: la ventana de 80 dĂ­as de exposiciĂłn va a crecer

Mythos y GPT-5.4-Cyber: la ventana de 80 dĂ­as de exposiciĂłn va a crecer

Comments
8 min read
How to Safely Execute LLM Commands in Production Systems

How to Safely Execute LLM Commands in Production Systems

Comments
6 min read
Why Cursor Keeps Generating MD5 Password Hashes in 2026
Cover image for Why Cursor Keeps Generating MD5 Password Hashes in 2026

Why Cursor Keeps Generating MD5 Password Hashes in 2026

2
Comments
3 min read
Your WAF thinks in ATT&CK. Your LLM app needs ATLAS. Here's the bridge.
Cover image for Your WAF thinks in ATT&CK. Your LLM app needs ATLAS. Here's the bridge.

Your WAF thinks in ATT&CK. Your LLM app needs ATLAS. Here's the bridge.

Comments
8 min read
Server builds, wallet signs, webhooks confirm — a non-custodial Web3 checkout pattern with Solana
Cover image for Server builds, wallet signs, webhooks confirm — a non-custodial Web3 checkout pattern with Solana

Server builds, wallet signs, webhooks confirm — a non-custodial Web3 checkout pattern with Solana

Comments
1 min read
IDOR in AI-Generated APIs: What Cursor Won't Check Automatically
Cover image for IDOR in AI-Generated APIs: What Cursor Won't Check Automatically

IDOR in AI-Generated APIs: What Cursor Won't Check Automatically

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.