DEV Community

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why the Variable Name Is the Most Important Feature in Secrets Detection

Why the Variable Name Is the Most Important Feature in Secrets Detection

Comments
8 min read
The 26-Dimensional Feature Vector: How a Machine Learns to Recognise a Secret

The 26-Dimensional Feature Vector: How a Machine Learns to Recognise a Secret

Comments
9 min read
We scanned 50+ MCP servers and found HIGH-severity bugs in Atlassian, GitHub, Cloudflare, and Microsoft — here's what we learned

We scanned 50+ MCP servers and found HIGH-severity bugs in Atlassian, GitHub, Cloudflare, and Microsoft — here's what we learned

1
Comments 1
4 min read
AI-Powered Security Code Reviews That Actually Work: A Threat-Model-First Methodology

AI-Powered Security Code Reviews That Actually Work: A Threat-Model-First Methodology

Comments
9 min read
What a Free Security Snapshot Can Tell You — and What It Cannot

What a Free Security Snapshot Can Tell You — and What It Cannot

Comments
4 min read
Why I Built an ML-Powered Secrets Detector Instead of Just Using Regex

Why I Built an ML-Powered Secrets Detector Instead of Just Using Regex

Comments
8 min read
What Building a SAST Tool Taught Me About AppSec That 13 Years of Software Engineering Didn't

What Building a SAST Tool Taught Me About AppSec That 13 Years of Software Engineering Didn't

Comments
8 min read
Your Private API is Currently Safe. One Developer Change Away From Unsafe.

Your Private API is Currently Safe. One Developer Change Away From Unsafe.

Comments
8 min read
False Positives in SAST — How I Built Suppression Into My Scanner and Why It Matters

False Positives in SAST — How I Built Suppression Into My Scanner and Why It Matters

Comments
9 min read
Writing Custom SAST Rules for Vulnerabilities Your Scanner Doesn't Cover

Writing Custom SAST Rules for Vulnerabilities Your Scanner Doesn't Cover

Comments
8 min read
How I Modelled the OWASP Top 10 Into a YAML Rule Engine

How I Modelled the OWASP Top 10 Into a YAML Rule Engine

Comments
8 min read
Introducing a OWASP Game for threat modeling Agentic AI, Cloud, Devops, Frontend, LLM, Automation, and Web

Introducing a OWASP Game for threat modeling Agentic AI, Cloud, Devops, Frontend, LLM, Automation, and Web

1
Comments 1
10 min read
SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

Comments
10 min read
From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement

From a Single IP to Exfiltrated Passwords in a PNG: My First Freelance Pentest Engagement

Comments
13 min read
60–80% of your CVEs are unreachable. Here's how to prove it.

60–80% of your CVEs are unreachable. Here's how to prove it.

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.