
Building a Security Scanner with Claude Code Skills - How I Tackled LLM's "p-hacking" Problem
The Problem That Emerged from Previous Articles In my previous article, Claude Code Security: 500+ Zero-Days Found, Security Stocks Crash 9.4% , I cov...

The Problem That Emerged from Previous Articles In my previous article, Claude Code Security: 500+ Zero-Days Found, Security Stocks Crash 9.4% , I cov...

Two months ago, I was selling Claude Code skills on Qiita. I had 75,000 page views. Zero paid purchases. Today, I have a working SaaS that scans AI-ge...

This week, a Hacker News post about document poisoning in RAG systems caught my attention. And over on Zenn (Japanese dev community), someone found ma...

Hacker News recently prohibited AI-generated comments, with 3,800 developers voting in favor. The rule is short. No extensive policy document. No AI i...

The Problem with Point-in-Time Testing The traditional penetration test follows a predictable cycle. An organization hires a team of testers. Over one...

What happens when the agent itself becomes the threat? Not because of a prompt injection (ASI01) or tool misuse (ASI02), but because the Claude model...

Biotrackr is a single-agent system. One agent, twelve tools, one identity. That is an architectural choice that eliminates an entire vulnerability cla...

Writing Custom Semgrep Rules to Catch Solana Anchor Vulnerabilities Before Auditors Do You've written your Anchor program. It compiles. Tests pass. Yo...
Most WordPress hacks are designed to be invisible to the site owner. Here are the signs, the recovery steps, and how to make sure it never… Continue r...

The right way to authenticate in AWS in 2026. Goodbye access keys, hello temporary credentials. The problem with access keys For years, the "normal" w...

target: Lab URL: https://portswigger.net/web-security/learning-paths/sql-injection/sql-injection-exploiting-blind-sql-injection-by-triggering-time-del...

The Backstory As a Full-Stack Engineer and the founder of Delta Auth , I’ve spent countless hours obsessing over the "handshake" between a user and an...

CVE-2026-29066: Arbitrary File Read in TinaCMS CLI via Permissive Vite Configuration Vulnerability ID: CVE-2026-29066 CVSS Score: 6.2 Published: 2026-...

Engineering Review Overall Assessment: B+ This is a strong result for a 14-day build. It shows real engineering judgment in the places that matter: se...

CVE-2026-32319: Unauthenticated Denial of Service in Ella Core AMF via Malformed NAS Messages Vulnerability ID: CVE-2026-32319 CVSS Score: 7.5 Publish...

Company says it doesn't know how long it will take to restore its Microsoft environment.

This study guide provides an in-depth analysis of core security technologies and methodologies required for the CompTIA SY0-701 exam. It focuses on em...
Introduction Continue reading on Medium »

The intersection of AI and security code review Security vulnerabilities in production code remain one of the most expensive problems in software engi...
Showing 981 - 1000 of 2063 articles