Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Anzeige 1 - 20 von 382 artikel

Top 4 Claude Skills for Smart Contract and Blockchain Developers

From Solana to StarkNet, these 4 Claude Skills give blockchain developers AI-powered workflows for smart contract auditing, multi-chain vulnerability scanning, Web3 pentesting, and on-chain analytics.

Top 7 Claude Skills for Product Managers

From PRD generation to RICE prioritization and JTBD analysis, these 7 Claude Skills give product managers structured, repeatable AI workflows for specs, roadmaps, and stakeholder communication.

Safe Path Handling: Why Secure Filesystem Operations Are Harder Than You Think

Path traversal, symlink attacks, and TOCTOU race conditions are some of the most persistent vulnerability classes in software. Here's why they keep happening and how to handle filesystem paths safely in every major language.

Top 7 Claude Skills for Embedded Systems Engineers

From ARM Cortex firmware to Zephyr RTOS workflows, these 7 Claude Skills give embedded engineers AI-powered workflows for bare-metal programming, device drivers, and real-time system design.

Top 8 Claude Skills for 3D Modeling, Game Dev, and Shader Programming

From Blender Python automation to shader writing and game engine scripting, these 8 Claude Skills give 3D artists and game developers AI-powered workflows for modeling, texturing, and rendering.

Top 8 Claude Skills for AR/VR Developers

From Three.js scenes to Unity XR workflows and iOS spatial experiences, these 8 Claude Skills help AR/VR developers build immersive applications faster without leaving the terminal.

Top 9 Claude Skills for Cybersecurity, Hacking, and Vulnerability Scanning

From YARA rule authoring to OWASP compliance checks, these 9 Claude Skills give security professionals AI-powered workflows for penetration testing, code auditing, and vulnerability detection.

Tauri Footguns: 5 Common Security Misconfigurations That Ship by Default

Tauri promises a more secure alternative to Electron for desktop apps, but several default configurations and common patterns quietly undermine its security model. We break down five footguns that developers should watch for.

The state of secrets: Why 28 million credentials leaked on GitHub in 2025, and what to do about it

28.65 million hardcoded secrets were added to public GitHub in 2025. This guide covers the full landscape of credentials management: why secrets leak, what tools catch them, and how to build a layered defense that works, from pre-commit hooks to AI-aware scanning.

From SBOM to AI-BOM: Rethinking Visibility in AI-Native Systems

AI supply chains move too fast for SBOMs. Learn why AI-BOM is becoming the foundation for AI security and governance.

Trivy GitHub Actions Supply Chain Compromise

Attackers compromised 75 version tags of the popular Trivy GitHub Action, turning the security scanner into a credential-stealing tool. Learn how the two-stage attack chain unfolded, whether you're affected, and how to secure your CI/CD pipelines against GitHub Actions supply chain attacks.

Top 8 Claude Skills for Entrepreneurs, Startup Founders, and Solopreneurs

From SaaS financial modeling to conversion copywriting and product-market fit research, these 8 Claude Skills give entrepreneurs AI-powered workflows for launching and scaling a business.

Inside StegaBin: How a DPRK Steganography Campaign Generated Headlines

North Korean hackers published 26 malicious npm packages using Pastebin steganography for C2. It made headlines everywhere. We checked the data: zero real-world impact. Here's what the campaign actually did, and what it tells us about the real risk of malicious package campaigns.

CVE-2026-29000: How a Public Key Breaks Authentication in pac4j-jwt

CVE-2026-29000 is a CVSS 10.0 authentication bypass in pac4j-jwt that lets attackers forge admin tokens using only the server's RSA public key. Learn how the vulnerability works, whether you're affected, and how to fix it.

Accelerating Public Sector Modernization with Secure AI-Driven Migration

Learn how generative AI accelerates legacy application migration for the public sector—and how Snyk secures AI-generated code, dependencies, containers, and cloud infrastructure from code to cloud.

DAST vs. Penetration Testing: 5 Key Differences

Deciding between DAST and penetration testing is vital for securing modern APIs and microservices. Learn how to combine these methodologies to build a robust, layered security strategy that protects your entire application portfolio.

Top 8 Claude Skills for UI/UX Engineers

Explore the top Claude Skills transforming UI/UX engineering by automating repetitive tasks like accessibility audits and component scaffolding. Discover how to streamline your workflow and focus on the creative decisions that truly matter.

Top 8 Claude Skills for Developers

From Manus-style task planning to Terraform code generation and Core Web Vitals optimization, these 8 Claude Skills give developers repeatable AI-powered workflows for real engineering work.

Six Principles for Rethinking DevSecOps for AI

The 6 factors are: Developer-First AI Security, Secure AI by Design, Shared AI Accountability, Automated AI Security, AI-Specific Intelligence, and AI Governance & Continuous Improvement

Your AI "Skills" Are the New Agentic Attack Surface

As AI moves beyond simple chat to autonomous execution, the skills powering these agents have emerged as a dangerous new attack surface. Learn how to protect your organization from malicious AI agent tools while maintaining development velocity in the age of agentic workflows.