close

DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Detect If Your LLM Proxy Is Silently Eating Your Tokens

How to Detect If Your LLM Proxy Is Silently Eating Your Tokens

Comments
5 min read
Subliminal Learning and the Hidden Channel Problem in LLM Training

Subliminal Learning and the Hidden Channel Problem in LLM Training

Comments
2 min read
When We Use AI To Ship Fast, Secrets Spread Fast

When We Use AI To Ship Fast, Secrets Spread Fast

Comments
11 min read
Agents That Disable Their Own Safety Gates

Agents That Disable Their Own Safety Gates

Comments
6 min read
First Day on Hack The Box

First Day on Hack The Box

Comments
1 min read
AI Red-Teaming for Beginners: Where to Start and What to Test

AI Red-Teaming for Beginners: Where to Start and What to Test

Comments
5 min read
We scanned 40 AI-built production apps. 30 criticals, 8 leaking apps, and the three patterns we kept seeing.

We scanned 40 AI-built production apps. 30 criticals, 8 leaking apps, and the three patterns we kept seeing.

Comments
3 min read
Every AI Startup Should Watch Out: 1000+ Ghost Accounts Drained Our Platform in 15 Days

Every AI Startup Should Watch Out: 1000+ Ghost Accounts Drained Our Platform in 15 Days

BERJAYA 1
Comments
5 min read
Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Comments
2 min read
Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Comments
2 min read
Your Perimeter Is Already Gone — Edge Security Isn't a Checkbox

Your Perimeter Is Already Gone — Edge Security Isn't a Checkbox

Comments
6 min read
Supply Chain Security in Next.js JavaScript Files with Subresource Integrity

Supply Chain Security in Next.js JavaScript Files with Subresource Integrity

Comments
9 min read
Privacidad por Diseño: Checklist técnico para la Ley 7593/2025

Privacidad por Diseño: Checklist técnico para la Ley 7593/2025

Comments
3 min read
Cyblack internship Ethical hacking sprint write-up

Cyblack internship Ethical hacking sprint write-up

Comments
3 min read
I Built a File Encryption App in Rust. Here’s What I Learned About Trust.

I Built a File Encryption App in Rust. Here’s What I Learned About Trust.

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.