DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Running NemoClaw or OpenClaw locally? Audit your server before you give an AI agent the keys.

Running NemoClaw or OpenClaw locally? Audit your server before you give an AI agent the keys.

Comments
2 min read
Stop Sending Raw PII to Your LLM

Stop Sending Raw PII to Your LLM

Comments
2 min read
Video Surveillance

Video Surveillance

Comments
9 min read
W3C Just Updated the DID Spec. Dock Labs Built an MCP Server for It. Here Is What Matters for Agent Builders.

W3C Just Updated the DID Spec. Dock Labs Built an MCP Server for It. Here Is What Matters for Agent Builders.

Comments
3 min read
Your Agentic AI's Safety System Gets Dumber As It Thinks Longer (And how to fix it)

Your Agentic AI's Safety System Gets Dumber As It Thinks Longer (And how to fix it)

Comments
2 min read
Read-Only Reentrancy Is Still Draining DeFi in 2026: A Defense Playbook for Protocol Developers

Read-Only Reentrancy Is Still Draining DeFi in 2026: A Defense Playbook for Protocol Developers

1
Comments
4 min read
I built an encrypted file sharing tool that requires zero accounts — here's why

I built an encrypted file sharing tool that requires zero accounts — here's why

1
Comments
1 min read
Deterministic Verification for CI Security Decisions (Introducing Nono-Gate)

Deterministic Verification for CI Security Decisions (Introducing Nono-Gate)

Comments
2 min read
Unified Authentication for OAuth2 and API Keys via Edge Token Normalization

Unified Authentication for OAuth2 and API Keys via Edge Token Normalization

Comments
9 min read
Solana Restaking Security in 2026: The Hidden Risk Surface of NCNs, VRTs, and the Coming Slashing Era

Solana Restaking Security in 2026: The Hidden Risk Surface of NCNs, VRTs, and the Coming Slashing Era

Comments
7 min read
The CPI Trust Boundary: 7 Ways Solana Cross-Program Invocations Betray You (And How to Lock Them Down)

The CPI Trust Boundary: 7 Ways Solana Cross-Program Invocations Betray You (And How to Lock Them Down)

Comments
7 min read
The Solana Security Toolbox in 2026: A Practitioner's Guide to Fuzzing, Static Analysis, and AI-Powered Auditing

The Solana Security Toolbox in 2026: A Practitioner's Guide to Fuzzing, Static Analysis, and AI-Powered Auditing

1
Comments
6 min read
ERC-4626 Vault Inflation Attacks Still Aren't Solved: Lessons From the sDOLA Llamalend Exploit

ERC-4626 Vault Inflation Attacks Still Aren't Solved: Lessons From the sDOLA Llamalend Exploit

Comments
4 min read
Post-Quantum DeFi: How to Prepare Your Smart Contracts Before Quantum Computers Break Ethereum's Cryptography

Post-Quantum DeFi: How to Prepare Your Smart Contracts Before Quantum Computers Break Ethereum's Cryptography

Comments
7 min read
The Step Finance Autopsy: Why $27M in Audited Contracts Died From a Phishing Email

The Step Finance Autopsy: Why $27M in Audited Contracts Died From a Phishing Email

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.