DEV Community

# applicationsecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII

280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII

4
Comments
7 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

Comments
12 min read
50+ Common Web Application Vulnerabilities Explained

50+ Common Web Application Vulnerabilities Explained

9
Comments 1
17 min read
The Hidden Costs of False Positives in Healthtech Security

The Hidden Costs of False Positives in Healthtech Security

Comments
5 min read
Agentic Container Security with Snyk MCP Server

Agentic Container Security with Snyk MCP Server

2
Comments
4 min read
Minimizing False Positives: Enhancing Security Efficiency

Minimizing False Positives: Enhancing Security Efficiency

Comments
4 min read
Finding Software Flaws Early in the Development Process Provides Clear ROI

Finding Software Flaws Early in the Development Process Provides Clear ROI

Comments 1
4 min read
Understanding Application Security: Best Practices, Common Threats, and Essential Tools

Understanding Application Security: Best Practices, Common Threats, and Essential Tools

Comments
7 min read
Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software

Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software

Comments 2
3 min read
Application Security vs. Software Security: Difference to Know

Application Security vs. Software Security: Difference to Know

Comments
2 min read
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant

The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant

Comments
4 min read
Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)

Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)

2
Comments 1
5 min read
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Comments
8 min read
A denial of service Regex breaks FastAPI security

A denial of service Regex breaks FastAPI security

1
Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.