Skip to main content

Security

Stay on top of security vulnerabilities, hardening practices, and secure development workflows. Covers CVEs, supply chain security, secrets management, and security tooling.

19posts

Guides

Posts

Security
2026-05-08|12 min read

Dirty Frag (CVE-2026-43284 + CVE-2026-43500): Local Root on Every Major Linux Distro

A two-bug chain in the Linux kernel networking subsystems lets any unprivileged local user become root in a single command. The PoC is public, the embargo broke, and not all distros have a patch yet.

Security
2026-05-08|11 min read

Next.js 16.2.6 and 15.5.18 Ship 13 Security Fixes: Patch Now

Vercel released back-to-back security updates for Next.js covering 7 high, 4 moderate, and 2 low severity advisories, including an upstream React denial-of-service issue. Here is what is broken, who is exposed, and the rollout path.

Security
2026-05-05|11 min read

Mini Shai-Hulud: PyTorch Lightning Just Stole Your CI Secrets

On April 30 a supply chain worm pushed malicious versions of PyTorch Lightning (10M+ downloads/month), intercom-client, and intercom-php to PyPI, npm, and Packagist in 48 hours. It steals every credential in your CI and propagates through your own GitHub tokens. Here is what to check and what to rotate.

Security
2026-05-04|13 min read

CVE-2026-3854: A Single git push Owned GitHub

A semicolon in a git push option let any authenticated user run code on GitHub.com's backend and on 88% of self-hosted GitHub Enterprise installs. Here is how the bug worked and what to do.

Security
2026-04-14|6 min read

Two Composer Command Injection Flaws Let Attackers Run Arbitrary Code - Even Without Perforce

CVE-2026-40176 and CVE-2026-40261 affect all Composer 2.x versions. A malicious composer.json or crafted package metadata can execute OS commands on your machine. Upgrade to 2.9.6 now.

Security
2025-01-24|12 min read

CI/CD Pipeline Hardening: A Practical Guide to Securing Your Build Infrastructure

Your CI/CD pipeline has access to source code, secrets, and production environments. Here is how to harden it against supply chain attacks, secret exfiltration, and artifact tampering.

Security
2025-01-24|10 min read

How to Integrate DAST Into Your CI/CD Pipeline (With OWASP ZAP Examples)

A practical guide to Dynamic Application Security Testing. Learn how DAST works, set up OWASP ZAP scans, compare it with Burp Suite, and automate security testing in your CI/CD pipeline with quality gates.

Security
2025-01-24|10 min read

Dependency Scanning: Finding Vulnerabilities Before Attackers Do

A practical guide to dependency scanning with Snyk, Dependabot, and native package manager tools. Learn how to detect vulnerable dependencies, automate fixes, and integrate scanning into your CI/CD pipeline.

Security
2025-01-24|10 min read

Pre-commit Hooks for Security: Stop Secrets Before They Hit Your Repository

Once a secret is committed to Git, it lives forever in the history. Pre-commit hooks with gitleaks, detect-secrets, and custom checks catch credentials before that happens.

Security
2025-01-24|10 min read

Secrets Management Guide: Vault, AWS Secrets Manager, and Azure Key Vault

Stop storing secrets in .env files and environment variables. This guide covers secrets management fundamentals, HashiCorp Vault dynamic secrets, AWS Secrets Manager rotation, and Azure Key Vault with practical code examples.

Security
2025-01-24|11 min read

Secure Coding Practices Every DevOps Engineer Should Know

A practical guide to writing secure code: input validation, output encoding, error handling, and authentication. With real examples in Python, JavaScript, and Go.

Security
2025-01-24|11 min read

Security-Focused Code Reviews: Catching Vulnerabilities Before Production

Learn how to review code with a security mindset. This guide covers common vulnerability patterns, language-specific pitfalls, and practical checklists for finding injection flaws, auth bypass, and logic bugs that automated tools miss.

Security
2025-01-24|11 min read

Software Supply Chain Security: SBOMs, Sigstore, and SLSA in Practice

Protect your software supply chain with practical steps for SBOM generation, artifact signing with Cosign, and SLSA provenance. Includes complete CI/CD pipeline examples for GitHub Actions and GitLab CI.