DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2026-27575: The Zombie Session: Breaking Vikunja's Auth with CVE-2026-27575

CVE-2026-27575: The Zombie Session: Breaking Vikunja's Auth with CVE-2026-27575

Comments
2 min read
Your AI Wrote the Backend. Who Owns the Breach?

Your AI Wrote the Backend. Who Owns the Breach?

7
Comments 1
3 min read
Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping

Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping

6
Comments 1
3 min read
CVE-2026-27606: Bundling Disaster: The Rollup Path Traversal Deep Dive

CVE-2026-27606: Bundling Disaster: The Rollup Path Traversal Deep Dive

Comments
2 min read
CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

Comments
2 min read
The Prompt Injection Problem: A Guide to Defense-in-Depth for AI Agents

The Prompt Injection Problem: A Guide to Defense-in-Depth for AI Agents

26
Comments 1
16 min read
How OpenAI and Persona Built an Identity Surveillance Machine for the US Government

How OpenAI and Persona Built an Identity Surveillance Machine for the US Government

3
Comments
7 min read
De IPTV a RAT: Destripando el sistema de vigilancia oculto en XuperTV

De IPTV a RAT: Destripando el sistema de vigilancia oculto en XuperTV

Comments
5 min read
Webhook Security Best Practices for Production 2025-2026

Webhook Security Best Practices for Production 2025-2026

1
Comments
7 min read
Hide API Keys from Your Frontend — No Backend Required

Hide API Keys from Your Frontend — No Backend Required

Comments
4 min read
The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

Comments
13 min read
VeraSnap Solves the Other Half: Building Cryptographic Proof of Reality in a World That Can't Detect Fakes

VeraSnap Solves the Other Half: Building Cryptographic Proof of Reality in a World That Can't Detect Fakes

Comments
18 min read
JWT Algorithm Confusion Attack: Two Active CVEs in 2026

JWT Algorithm Confusion Attack: Two Active CVEs in 2026

Comments 1
4 min read
The Day Agents Achieved Real Authority, and What It Means for Trust

The Day Agents Achieved Real Authority, and What It Means for Trust

2
Comments
6 min read
Building the Impossible: HTTP Proxy Layer for Zero-Knowledge AI API Calls

Building the Impossible: HTTP Proxy Layer for Zero-Knowledge AI API Calls

5
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.