DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Axios NPM Supply Chain Angriff: API Projekte schÞtzen

Axios NPM Supply Chain Angriff: API Projekte schÞtzen

Comments
8 min read
Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)

Comments
9 min read
Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Securing Python Dependencies: Balancing Practicality and Risk After Supply Chain Attacks Like Telnyx Compromise

Comments
10 min read
āļ§āļīāļ˜āļĩāļĢāļąāļāļĐāļēāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ NPM Dependencies āļ„āļđāđˆāļĄāļ·āļ­āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ‹āļąāļžāļžāļĨāļēāļĒāđ€āļŠāļ™āļŠāļģāļŦāļĢāļąāļšāļ™āļąāļāļžāļąāļ’āļ™āļē API

āļ§āļīāļ˜āļĩāļĢāļąāļāļĐāļēāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ NPM Dependencies āļ„āļđāđˆāļĄāļ·āļ­āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ‹āļąāļžāļžāļĨāļēāļĒāđ€āļŠāļ™āļŠāļģāļŦāļĢāļąāļšāļ™āļąāļāļžāļąāļ’āļ™āļē API

Comments
5 min read
24 Hours of Chaos: Saving My Open Source Project from a Supply Chain Attack (plain-crypto-js)

24 Hours of Chaos: Saving My Open Source Project from a Supply Chain Attack (plain-crypto-js)

Comments
2 min read
Antropic's Claude Code leaked and Axios NPM Inflitration

Antropic's Claude Code leaked and Axios NPM Inflitration

Comments
3 min read
Axios NPM ã‚ĩプãƒĐã‚Īチェマãƒģæ”ŧ撃ãŪäŧ•įĩ„ãŋãĻAPIプロã‚ļェã‚ŊトãŪäŋč­·æ–đæģ•

Axios NPM ã‚ĩプãƒĐã‚Īチェマãƒģæ”ŧ撃ãŪäŧ•įĩ„ãŋãĻAPIプロã‚ļェã‚ŊトãŪäŋč­·æ–đæģ•

Comments
3 min read
What the Claude Code source leak reveals about how it actually works (and what to do with that)

What the Claude Code source leak reveals about how it actually works (and what to do with that)

Comments
4 min read
Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Engineer's Guide to Surviving Global Cyber Compliance: Unpacking the OSPS Baseline

Comments
3 min read
What Is ASN and How It Helps Security: A Beginner Guide

What Is ASN and How It Helps Security: A Beginner Guide

Comments
3 min read
Detecting Prompt Injection in LLM Apps (Python Library)

Detecting Prompt Injection in LLM Apps (Python Library)

Comments
1 min read
Claude Code source map leaks are a wake-up call — here's how to monitor agent vulnerabilities

Claude Code source map leaks are a wake-up call — here's how to monitor agent vulnerabilities

Comments
4 min read
The Zero Privilege Paradigm: Definitive Guide to Immutable Security

The Zero Privilege Paradigm: Definitive Guide to Immutable Security

Comments
4 min read
Persona Persistence Attacks: When Your AI Agent's Soul File Becomes a Backdoor

Persona Persistence Attacks: When Your AI Agent's Soul File Becomes a Backdoor

Comments
2 min read
I Read All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

I Read All 512,000 Lines of Claude Code's Leaked Source — Here's What Anthropic Was Hiding

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.