Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Reliable Shopify Webhooks: Idempotency, Retries, and Signature Verification
Cover image for Reliable Shopify Webhooks: Idempotency, Retries, and Signature Verification

Reliable Shopify Webhooks: Idempotency, Retries, and Signature Verification

Comments
5 min read
Getting Started with eslint-plugin-vercel-ai-security

Getting Started with eslint-plugin-vercel-ai-security

Comments
2 min read
My 2025 Year in Review: From 0 to 200 AI Security Engines

My 2025 Year in Review: From 0 to 200 AI Security Engines

Comments 1
4 min read
HTTP/2 and Header Consistency: The Holy Grail of Stealth
Cover image for HTTP/2 and Header Consistency: The Holy Grail of Stealth

HTTP/2 and Header Consistency: The Holy Grail of Stealth

Comments
6 min read
Stop Sharing .env Files on Slack: Introducing Multi-User Encryption for VS Code

Stop Sharing .env Files on Slack: Introducing Multi-User Encryption for VS Code

Comments
2 min read
Stop Begging Your AI to Be Safe: The Case for Constraint Engineering
Cover image for Stop Begging Your AI to Be Safe: The Case for Constraint Engineering

Stop Begging Your AI to Be Safe: The Case for Constraint Engineering

Comments
4 min read
Mapping Your Codebase to OWASP Top 10 with 247 ESLint Rules
Cover image for Mapping Your Codebase to OWASP Top 10 with 247 ESLint Rules

Mapping Your Codebase to OWASP Top 10 with 247 ESLint Rules

Comments
5 min read
Zero Trust Agentic AI Architecture: Designing Autonomy Behind Guardrails
Cover image for Zero Trust Agentic AI Architecture: Designing Autonomy Behind Guardrails

Zero Trust Agentic AI Architecture: Designing Autonomy Behind Guardrails

Comments
4 min read
Stop Giving AI the Steering Wheel

Stop Giving AI the Steering Wheel

Comments
2 min read
EIOC as a Detection Model: From Framework to Code
Cover image for EIOC as a Detection Model: From Framework to Code

EIOC as a Detection Model: From Framework to Code

Comments
5 min read
The Day "Standard Security" Wasn't Enough: A Deep Dive into HTTP Headers

The Day "Standard Security" Wasn't Enough: A Deep Dive into HTTP Headers

1
Comments
3 min read
New Year, New Build: Traata Goes Mobile
Cover image for New Year, New Build: Traata Goes Mobile

New Year, New Build: Traata Goes Mobile

Comments
2 min read
Getting Started with eslint-plugin-secure-coding
Cover image for Getting Started with eslint-plugin-secure-coding

Getting Started with eslint-plugin-secure-coding

Comments
3 min read
OSI Layer 6—Presentation Layer Security
Cover image for OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
Protecting a document is not the same as proving it exists

Protecting a document is not the same as proving it exists

Comments
2 min read
Goodbye Fail2Ban: Hardening Netbird & Caddy with CrowdSec
Cover image for Goodbye Fail2Ban: Hardening Netbird & Caddy with CrowdSec

Goodbye Fail2Ban: Hardening Netbird & Caddy with CrowdSec

1
Comments
8 min read
Supply Chain Attacks on Mobile Apps and How Docker Stops Them Before They Ship

Supply Chain Attacks on Mobile Apps and How Docker Stops Them Before They Ship

Comments
3 min read
Securing the Future: A Practical Guide to AWS Agentic AI Security

Securing the Future: A Practical Guide to AWS Agentic AI Security

Comments
5 min read
Beyond `apt upgrade`: Automating Linux Hardening for Public Sector Workloads
Cover image for Beyond `apt upgrade`: Automating Linux Hardening for Public Sector Workloads

Beyond `apt upgrade`: Automating Linux Hardening for Public Sector Workloads

Comments
4 min read
The Security Engineer Interview Cheat Sheet for JavaScript Developers
Cover image for The Security Engineer Interview Cheat Sheet for JavaScript Developers

The Security Engineer Interview Cheat Sheet for JavaScript Developers

Comments
3 min read
I Thought It Was Refactoring My Code. It Actually Wiped It Out.

I Thought It Was Refactoring My Code. It Actually Wiped It Out.

Comments
3 min read
3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)
Cover image for 3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

Comments
2 min read
Day 11: New Year, New Security (Password Generator)
Cover image for Day 11: New Year, New Security (Password Generator)

Day 11: New Year, New Security (Password Generator)

Comments
1 min read
Prompting for Safety: How to Stop Your LLM From Leaking Sensitive Data
Cover image for Prompting for Safety: How to Stop Your LLM From Leaking Sensitive Data

Prompting for Safety: How to Stop Your LLM From Leaking Sensitive Data

Comments
9 min read
Hardware-backed SSH authentication with YubiKey (FIDO2)
Cover image for Hardware-backed SSH authentication with YubiKey (FIDO2)

Hardware-backed SSH authentication with YubiKey (FIDO2)

Comments 1
3 min read
loading...