DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Why Your AI-Generated Code is Probably Garbage (And How to Fix It)

Comments
16 min read
What Developers Can Learn From Exchange Security Models

What Developers Can Learn From Exchange Security Models

3
Comments
2 min read
Token Validation

Token Validation

Comments
3 min read
AWS Security Starter Pack: 5 Essential Tools

AWS Security Starter Pack: 5 Essential Tools

2
Comments
3 min read
Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Start Here: PainTracker + CrisisCore Build Log (Privacy-First, Offline-First, No Surveillance)

Comments
1 min read
Day 14 — Network Boundary Monitoring (Watched from the Woods)

Day 14 — Network Boundary Monitoring (Watched from the Woods)

4
Comments
2 min read
SQL Injection Audit Challenge Week 1

SQL Injection Audit Challenge Week 1

Comments
27 min read
How Quality Assurance Engineers Can Strengthen Application Security

How Quality Assurance Engineers Can Strengthen Application Security

Comments
2 min read
Why CAPTCHAs today are so bad (and what we should be building instead)

Why CAPTCHAs today are so bad (and what we should be building instead)

1
Comments
1 min read
QARX-256

QARX-256

Comments
1 min read
Stealth Inline Hook Detection via LR Return Address

Stealth Inline Hook Detection via LR Return Address

Comments
2 min read
Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
How 129KB of Whitespace (and a Recursive Loop) Broke the Web

How 129KB of Whitespace (and a Recursive Loop) Broke the Web

Comments
5 min read
Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Comments
4 min read
ASP.NET CORE - How to using IAuthorizationRequirementData

ASP.NET CORE - How to using IAuthorizationRequirementData

Comments
2 min read
📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

Comments
3 min read
Building a FinTech Approval System with Symfony 7.4

Building a FinTech Approval System with Symfony 7.4

Comments
8 min read
n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

Comments
5 min read
Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Comments
3 min read
Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Comments
1 min read
[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

Comments
2 min read
Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Comments
9 min read
Day 12 — React2Shell CVE (The Mines)

Day 12 — React2Shell CVE (The Mines)

Comments
2 min read
How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

Comments
3 min read
Fortifying Your Data: Row-Level Security in Power BI.

Fortifying Your Data: Row-Level Security in Power BI.

Comments
4 min read
loading...