암시적 설정을 배제한 Explicit SecurityFilterChain 도입으로 Actuator 보안 사고 원천 차단
Spring Security with Spring Boot Actuator: the authorization model that survived the incident
Spring Security with Spring Boot Actuator: the authorization model that survived the incident
What to Audit in a Vibe-Coded MVP Before Real Users See It
How GitHub Is Securing Agentic Workflows in Modern CI CD Systems
I Got Burned by Prompt Injection in Production. Here Are 2 Tiny npm Libs That Stopped It.
Prompt injection in LinkedIn profiles
Good Enough Is Good Enough
How to Prevent IDOR Vulnerabilities in Django REST APIs
Security Through Obscurity Is Not Bad
Linux kernel vulnerabilities without distro notice: what this changes in my Ubuntu/Railway stack
Linux kernel vulnerabilidades sin aviso a distros: lo que esto cambia en mi stack Ubuntu/Railway
Secure File Uploads: Seven Checks and Why Each One Exists
Mapa de Ciberseguridad en AWS: Guía Completa de Servicios
I audited my AI tool catalog with Claude — turns out 50% was mis-categorized
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
The Cyber Perfect Storm Is Here — And Your AI Agents Are in the Blast Radius
🦊GoClaw Deep Dive 🤖 — A Builder's Guide to a Multi-Tenant AI Agent Platform 📘
GET Serves Cache, POST Runs Inference: Cost Safety for a Public LLM Endpoint
How to Secure AI Agents Against Authorization Attacks
Why Claude Code PreToolUse Hooks Can Still Be Bypassed
It's a myth that you need Mythos to find bugs: Open source models can do it just as well