DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Enterprise Blockchain in TypeScript: Real-World Case Studies, Protocol Mappings, MPC, HSM & Post-Quantum Patterns That Actually Run

Comments
11 min read
Blind `npm install` Execution Risks Security Vulnerabilities: Review Lockfiles to Mitigate Threats

Blind `npm install` Execution Risks Security Vulnerabilities: Review Lockfiles to Mitigate Threats

Comments
10 min read
The Axios NPM Package Compromise: Lessons for Startups and Tech Firms

The Axios NPM Package Compromise: Lessons for Startups and Tech Firms

1
Comments 1
5 min read
axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

axios Got Hacked. If You Ran npm install Yesterday, Read This Now.

Comments
4 min read
💎REL: oauth2 v2.0.18

💎REL: oauth2 v2.0.18

Comments
1 min read
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem

Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem

Comments
8 min read
Your Agent Monitoring SDK Was the Backdoor

Your Agent Monitoring SDK Was the Backdoor

Comments
10 min read
؃؊؁؊ØĐ ØŠØĢŲ…ŲŠŲ† ØŠØĻØđŲŠØ§ØŠ NPM: ØŊŲ„ŲŠŲ„ ØīØ§Ų…Ų„ Ų„ØĢŲ…Ų† ØģŲ„ØģŲ„ØĐ Ø§Ų„ØŠŲˆØąŲŠØŊ Ų„Ų…Ø·ŲˆØąŲŠ API

؃؊؁؊ØĐ ØŠØĢŲ…ŲŠŲ† ØŠØĻØđŲŠØ§ØŠ NPM: ØŊŲ„ŲŠŲ„ ØīØ§Ų…Ų„ Ų„ØĢŲ…Ų† ØģŲ„ØģŲ„ØĐ Ø§Ų„ØŠŲˆØąŲŠØŊ Ų„Ų…Ø·ŲˆØąŲŠ API

Comments
4 min read
chapter 2 : structure of JWT

chapter 2 : structure of JWT

Comments
1 min read
Axios NPM Supply Chain Angriff: API Projekte schÞtzen

Axios NPM Supply Chain Angriff: API Projekte schÞtzen

Comments
8 min read
Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Comments
9 min read
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Comments
10 min read
āļ§āļīāļ˜āļĩāļĢāļąāļāļĐāļēāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ NPM Dependencies āļ„āļđāđˆāļĄāļ·āļ­āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ‹āļąāļžāļžāļĨāļēāļĒāđ€āļŠāļ™āļŠāļģāļŦāļĢāļąāļšāļ™āļąāļāļžāļąāļ’āļ™āļē API

āļ§āļīāļ˜āļĩāļĢāļąāļāļĐāļēāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ NPM Dependencies āļ„āļđāđˆāļĄāļ·āļ­āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ‹āļąāļžāļžāļĨāļēāļĒāđ€āļŠāļ™āļŠāļģāļŦāļĢāļąāļšāļ™āļąāļāļžāļąāļ’āļ™āļē API

Comments
5 min read
24 Hours of Chaos: Saving My Open Source Project from a Supply Chain Attack (plain-crypto-js)

24 Hours of Chaos: Saving My Open Source Project from a Supply Chain Attack (plain-crypto-js)

Comments
2 min read
Antropic's Claude Code leaked and Axios NPM Inflitration

Antropic's Claude Code leaked and Axios NPM Inflitration

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.