DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Your AI Agent Knows Your Passwords — Here's How I Fixed It

Your AI Agent Knows Your Passwords — Here's How I Fixed It

1
Comments 2
4 min read
GenosDB: A Solution for Trust in Distributed Systems

GenosDB: A Solution for Trust in Distributed Systems

Comments
3 min read
Your package.json Is Lying to You

Your package.json Is Lying to You

Comments
5 min read
The State of MCP Server Security in 2026 — 118 Findings Across 68 Packages

The State of MCP Server Security in 2026 — 118 Findings Across 68 Packages

Comments
3 min read
Designing an ORM-Agnostic Multi-Tenant RBAC System in TypeScript

Designing an ORM-Agnostic Multi-Tenant RBAC System in TypeScript

Comments
2 min read
Static Immutability: How Modern P2P Networks Build Trust Without Servers or Blockchain

Static Immutability: How Modern P2P Networks Build Trust Without Servers or Blockchain

Comments
4 min read
How GenosDB Solved the Distributed Trust Paradox: A Guide to P2P Security

How GenosDB Solved the Distributed Trust Paradox: A Guide to P2P Security

Comments
4 min read
Your AI Agent Remembers Everything. Can It Prove It Forgot?

Your AI Agent Remembers Everything. Can It Prove It Forgot?

Comments
8 min read
You Deployed an AI Chatbot. Here's What's Already Coming For It.

You Deployed an AI Chatbot. Here's What's Already Coming For It.

Comments
8 min read
I Built an Open-Source Security Scanner for AI Agents — Here's What I Found Scanning My Own

I Built an Open-Source Security Scanner for AI Agents — Here's What I Found Scanning My Own

Comments
3 min read
Trust No One: Implementing True End-to-End Encryption with Insertable Streams

Trust No One: Implementing True End-to-End Encryption with Insertable Streams

1
Comments
8 min read
Making Amazon Bedrock AgentCore Gateway Accessible (Only Through CloudFront)

Making Amazon Bedrock AgentCore Gateway Accessible (Only Through CloudFront)

1
Comments
4 min read
Building Reliable Software: The Trap of Convenience

Building Reliable Software: The Trap of Convenience

Comments
7 min read
Your Phone Already Has the Hardware to Prove a Photo Is Real. Nothing Uses It.

Your Phone Already Has the Hardware to Prove a Photo Is Real. Nothing Uses It.

Comments
3 min read
I built a reproducible PKI and TLS lab inside a constrained mobile environment

I built a reproducible PKI and TLS lab inside a constrained mobile environment

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.