DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The LLM proxy landscape in 2026: Helicone acquired, LiteLLM compromised, and what's next

The LLM proxy landscape in 2026: Helicone acquired, LiteLLM compromised, and what's next

Comments
3 min read
1Password & Dotenvx Tool

1Password & Dotenvx Tool

Comments
1 min read
What Do You Depend On? When the Chain of Trust Breaks

What Do You Depend On? When the Chain of Trust Breaks

Comments
3 min read
The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

Comments
9 min read
Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Claude Code Source Leaked: 5 Hidden Features Found in 510K Lines of Code

Comments
5 min read
ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file

ShadowFortress: how I aggregate hundreds of IP blocklists into a single ready-to-use file

Comments
3 min read
Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026

Zero-Trust Architecture: The Security Model Every Developer Needs to Understand in 2026

1
Comments 1
4 min read
Claude Mythos Leak: Why Cybersec Pros + Tech Workers Should Be Nervous Right Now 😰

Claude Mythos Leak: Why Cybersec Pros + Tech Workers Should Be Nervous Right Now 😰

Comments
3 min read
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Comments
9 min read
Mulesoft with AI

Mulesoft with AI

Comments
3 min read
Indirect Prompt Injection Is a Trust Boundary Problem

Indirect Prompt Injection Is a Trust Boundary Problem

Comments
5 min read
This Week in AI Security: OpenAI Codex Hacked, LiteLLM Supply Chain Attack, Claude Gets Computer Control

This Week in AI Security: OpenAI Codex Hacked, LiteLLM Supply Chain Attack, Claude Gets Computer Control

Comments
3 min read
Claude Mythos: What We Actually Know (and What We Don't)

Claude Mythos: What We Actually Know (and What We Don't)

Comments
8 min read
Your package was compromised. How do you prove which version you actually shipped?

Your package was compromised. How do you prove which version you actually shipped?

Comments
3 min read
Security Is a Myth | The Axios Supply Chain Attack

Security Is a Myth | The Axios Supply Chain Attack

2
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.