DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

Comments
2 min read
A New Day, a New Security Attack on npm…

A New Day, a New Security Attack on npm…

Comments
3 min read
Building AuthPress: From Simple Telegram 2FA to Extensible WordPress Security Platform

Building AuthPress: From Simple Telegram 2FA to Extensible WordPress Security Platform

Comments
2 min read
CMK: The Master Key to Your AWS Encryption Kingdom

CMK: The Master Key to Your AWS Encryption Kingdom

1
Comments
4 min read
Securing Agentic AI Systems

Securing Agentic AI Systems

1
Comments
12 min read
Puzzles for Hacker (task only)

Puzzles for Hacker (task only)

Comments
6 min read
## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

Comments
3 min read
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

Comments
17 min read
Building a CLI for the Ecosyste.ms API

Building a CLI for the Ecosyste.ms API

Comments
3 min read
Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

Comments
4 min read
API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

1
Comments
3 min read
Biometric fingerprint authentication on SmartCard Chips

Biometric fingerprint authentication on SmartCard Chips

Comments
3 min read
Top Dependency Scanners: A Comprehensive Guide

Top Dependency Scanners: A Comprehensive Guide

Comments
6 min read
SSH Key Authentication in Linux

SSH Key Authentication in Linux

2
Comments
4 min read
30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

2
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 16, 2025

Outil de Cybersécurité du Jour - Sep 16, 2025

Comments
3 min read
TemplateScorer

TemplateScorer

Comments
3 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

1
Comments
4 min read
Security Risks and Improvement Strategies for Multi-Channel OTP Fallback

Security Risks and Improvement Strategies for Multi-Channel OTP Fallback

Comments
3 min read
Security in CI/CD Pipelines

Security in CI/CD Pipelines

Comments
10 min read
Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Comments
4 min read
Why DevOps Teams Overlook Dependency Analysis (and Why You Shouldn’t)

Why DevOps Teams Overlook Dependency Analysis (and Why You Shouldn’t)

1
Comments
2 min read
Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

5
Comments
2 min read
SSE-KMS: The Secret Keeper of Your Cloud Storage

SSE-KMS: The Secret Keeper of Your Cloud Storage

1
Comments
4 min read
secure-pubsub-bridge: End-to-End RSA Encryption for Google Cloud Pub/Sub

secure-pubsub-bridge: End-to-End RSA Encryption for Google Cloud Pub/Sub

Comments
2 min read
loading...