loading
loading
Tag
Articles related to this tag. If you’re new, start with the newest posts.
A practical checklist to add minimal-but-sufficient logs for AI apps and automations. Capture the evidence you need for debugging, cost control, and incident response without logging secrets.
A practical checklist to reduce prompt injection and data exfiltration risk in AI apps. Audit your input surfaces, tool permissions, and logging so you can ship with confidence.
A practical CSP rollout plan for Next.js: start in Report-Only, collect violation reports, tighten allowlists, migrate scripts toward nonces/hashes, then enforce with a rollback plan.
A practical checklist for security headers in Next.js. Start with low-breakage headers, add HSTS only when HTTPS is guaranteed, stage CSP in Report-Only, and apply COOP/COEP/CORP only on routes that need cross-origin isolation.
A practical Dependabot operating policy: scope (npm + Actions), weekly batching, grouping, safe defaults for auto-merge, and CI gates that prevent update PRs from becoming incidents.
A practical checklist to harden GitHub Actions as part of your software supply chain. Focus on least-privilege permissions, pinning third-party Actions by SHA, safe handling of fork PRs, and deployment gates.
A practical checklist to reduce npm supply chain risk by treating dependency diffs as security events. Focus on new dependencies, install scripts, lockfile discipline, and incident first moves.
A practical, ops-style authorization checklist to prevent IDOR (broken object-level access control). Focus on where IDs enter, how reads/writes are scoped, consistent deny behavior, and one regression test that prevents reintroducing the bug.
A practical, security-first checklist to run before connecting a wallet, signing messages, or approving tokens to claim an airdrop. Focus on official entry points, permission intent, and post-claim hygiene.
A practical weekly workflow to collect airdrop leads, verify official sources, track deadlines, and reduce scam exposure — in 30–45 minutes per week.
AI-assisted development ships fast, and that makes authorization regressions common. This practical guide shows how to detect and fix IDOR (broken object-level authorization) with a repeatable review, tests, and rollout-safe patterns.
Permit2 changed how token approvals are handled in many EVM dApps. Learn what it is, where the risk concentrates, what to check on signing screens, and a practical routine to revoke unused permissions.
A practical checklist for reading wallet signing screens. Learn to identify the action type, counterparty, and scope, and avoid high-risk permissions like Approve, Permit, and SetApprovalForAll.
Old ERC-20/NFT approvals are a common attack surface. This practical guide explains what approvals mean, when to revoke, and a repeatable audit routine to reduce blast radius.
A practical playbook for Next.js security updates: decide urgency, upgrade with small diffs, let CI fail fast, verify key flows on preview, deploy with a rollback plan, and rotate secrets when exposure is plausible.
A practical anti-phishing routine for Web3: control entry points, read wallet permissions before signing, and reduce blast radius after actions. Designed to be repeatable before every connect/sign/claim.
A practical incident response checklist for CVE-2025-66478 in Next.js: confirm exposure, upgrade to patched versions, verify key flows, and rotate secrets when plausible. Written for small teams that need a repeatable process.