Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
JWT security mistakes that will get you breached
Cover image for JWT security mistakes that will get you breached

JWT security mistakes that will get you breached

Comments
4 min read
Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade
Cover image for Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Comments 1
3 min read
Audit-trail receipts you can verify offline
Cover image for Audit-trail receipts you can verify offline

Audit-trail receipts you can verify offline

Comments
3 min read
Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters
Cover image for Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters

Kamino Lend's $3 Billion TWAP Promise That Doesn't Apply When It Matters

Comments
6 min read
Your First Supabase RLS Policy, Without Exposing Your Whole Database

Your First Supabase RLS Policy, Without Exposing Your Whole Database

Comments
5 min read
The 5-Layer Security Model Every AI Agent Needs in Production

The 5-Layer Security Model Every AI Agent Needs in Production

Comments
10 min read
Como parei de fazer deploy pra mudar permissão de usuário

Como parei de fazer deploy pra mudar permissão de usuário

1
Comments 1
3 min read
Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Build a Voice OTP System: Phone-Based Two-Factor Authentication in 10 Minutes

Comments
5 min read
How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)
Cover image for How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

How I Found My First CVE as a College Student (And What Most Guides Don't Tell You)

1
Comments
5 min read
Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.
Cover image for Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Comments
3 min read
Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Kubernetes Secrets Security: Why Built-in Secrets Fail in Production

Comments
7 min read
194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true
Cover image for 194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

194 IP Addresses. One Fake iPhone. Six Days Undetected. published: true

Comments
1 min read
Second-Order Injection: Attacking the Evaluator in LLM Safety Monitors
Cover image for Second-Order Injection: Attacking the Evaluator in LLM Safety Monitors

Second-Order Injection: Attacking the Evaluator in LLM Safety Monitors

1
Comments
14 min read
⚠️ Race Conditions in APIs - The Bug You Can’t See
Cover image for ⚠️ Race Conditions in APIs - The Bug You Can’t See

⚠️ Race Conditions in APIs - The Bug You Can’t See

1
Comments
5 min read
Argon2id Master Passwords: Securing Your Self-Hosted AI Agent Wallet
Cover image for Argon2id Master Passwords: Securing Your Self-Hosted AI Agent Wallet

Argon2id Master Passwords: Securing Your Self-Hosted AI Agent Wallet

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.