DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Perp DEX Liquidation Security: How Hyperliquid's $6M JELLY Exploit Exposed Critical Oracle Dependencies

Perp DEX Liquidation Security: How Hyperliquid's $6M JELLY Exploit Exposed Critical Oracle Dependencies

Comments
6 min read
The Invisible Attack: How CSS Can Hijack Your AI Agent

The Invisible Attack: How CSS Can Hijack Your AI Agent

Comments
2 min read
I Built an MCP Tool That Scans Smart Contracts for Security Risks

I Built an MCP Tool That Scans Smart Contracts for Security Risks

1
Comments
2 min read
Rogue AI Agents Are Peer-Pressuring Each Other. The Fix Isn't More Training.

Rogue AI Agents Are Peer-Pressuring Each Other. The Fix Isn't More Training.

Comments
7 min read
AI Guardrail Poisoning: Someone Rewrote McKinsey’s Lilli With One SQL Query

AI Guardrail Poisoning: Someone Rewrote McKinsey’s Lilli With One SQL Query

Comments
7 min read
Defense in Depth: Tenant Isolation for an Agent That Executes Code

Defense in Depth: Tenant Isolation for an Agent That Executes Code

1
Comments
14 min read
Your AI Agent Has Your Stripe Key. What Could Go Wrong?

Your AI Agent Has Your Stripe Key. What Could Go Wrong?

5
Comments
4 min read
Death by a Thousand Rounds: How Balancer V2 Lost $128M to a Rounding Error

Death by a Thousand Rounds: How Balancer V2 Lost $128M to a Rounding Error

Comments
7 min read
3 AI Agent Guardrail Failure Modes from the HN CTF

3 AI Agent Guardrail Failure Modes from the HN CTF

Comments
3 min read
Real-Time SQL Analysis in VS Code: Catch Dangerous Queries Before You Save the File

Real-Time SQL Analysis in VS Code: Catch Dangerous Queries Before You Save the File

1
Comments
3 min read
IAM Development Lab in Keycloak

IAM Development Lab in Keycloak

2
Comments
13 min read
Stop Shipping Ungoverned AI: Add Policy Gates, Audit Trails, and Compliance to Every LLM Call

Stop Shipping Ungoverned AI: Add Policy Gates, Audit Trails, and Compliance to Every LLM Call

Comments
7 min read
Cross-Chain Governance Attacks: How Flash-Loaned Voting Power Becomes the Next Nine-Figure Exploit

Cross-Chain Governance Attacks: How Flash-Loaned Voting Power Becomes the Next Nine-Figure Exploit

Comments
8 min read
Your Supabase RLS Is Probably Wrong: A Security Guide for Vibe Coders

Your Supabase RLS Is Probably Wrong: A Security Guide for Vibe Coders

1
Comments 1
4 min read
EU Cyber Resilience Act: What It Means for Your Codebase and How to Prepare

EU Cyber Resilience Act: What It Means for Your Codebase and How to Prepare

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.