DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Three Vulnerabilities That Quietly Rewrote the Threat Model in 2025

Comments
8 min read
SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume

SPENDING_LIMIT Policy: Cap Your AI Agent's Daily Transaction Volume

Comments
5 min read
TOCTOU of Trust: Why Agent Governance Must Be Continuous

TOCTOU of Trust: Why Agent Governance Must Be Continuous

1
Comments
8 min read
I Built the Middleware Layer MCP is Missing

I Built the Middleware Layer MCP is Missing

Comments
3 min read
Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Authentication Security Deep Dive: From Brute Force to Salted Hashing (With Java Examples)

Comments
4 min read
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Two DM-origin problems, not one: security hardening vs. compliance-bias hardening

Comments
3 min read
Cursor Keeps Writing IDOR Into Your APIs. Here's the Fix.

Cursor Keeps Writing IDOR Into Your APIs. Here's the Fix.

4
Comments
3 min read
Vaultic: WebAuthn Authentication for Laravel – The Death of Passwords

Vaultic: WebAuthn Authentication for Laravel – The Death of Passwords

Comments
5 min read
Your AI Security Problem Starts Before the Prompt

Your AI Security Problem Starts Before the Prompt

Comments
8 min read
Cloudflare and GitHub are building identity systems for AI agents. We're not ready for this.

Cloudflare and GitHub are building identity systems for AI agents. We're not ready for this.

Comments
3 min read
TOCTOU of Trust: Why Agent Governance Must Be Continuous

TOCTOU of Trust: Why Agent Governance Must Be Continuous

1
Comments
8 min read
Mythos y GPT-5.4-Cyber: la ventana de 80 días de exposición va a crecer

Mythos y GPT-5.4-Cyber: la ventana de 80 días de exposición va a crecer

Comments
8 min read
How to Safely Execute LLM Commands in Production Systems

How to Safely Execute LLM Commands in Production Systems

Comments
6 min read
IDOR in AI-Generated APIs: What Cursor Won't Check Automatically

IDOR in AI-Generated APIs: What Cursor Won't Check Automatically

Comments
3 min read
Why Cursor Keeps Generating MD5 Password Hashes in 2026

Why Cursor Keeps Generating MD5 Password Hashes in 2026

2
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.