Skip to main content

Ressourcen

White paper

From First Prompt to Final Fix: How Snyk Secures AI-Driven Development

Jetzt lesen

Report

Unifying Control for Agentic AI With Evo By Snyk

Jetzt lesen

Artikel

From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills

Jetzt lesen
Typ
Thema

Anzeige 145 - 168 von 357 ressourcen

Article

5 Best MCP Servers for Developers

Here are Snyk’s Top 5 recommendations for MCP Servers that developers will get the most value from.

Article

A Beginner's Guide to Visually Understanding MCP Architecture

A beginner's guide to understanding Model Context Protocol (MCP) architecture visually. Explore MCP Hosts, Clients, Servers, transport types, and how MCP extends LLMs beyond function calling & REST APIs.

Article

How to Add a New MCP Server to VS Code

Unlock the power of AI in VS Code! Learn how to integrate MCP Servers, like GitHub's, to extend GitHub Copilot's capabilities with custom tools. This guide covers setup, configuration with .vscode/mcp.json, and using agent mode for enhanced developer workflows.

Article

Exploiting MCP Servers Vulnerable to Command Injection

Learn how vulnerable MCP servers in AI and LLM workflows, especially for developers, can lead to dangerous command injection attacks and how to mitigate the risks.

Article

Enhanced Vulnerability Detection with AI

Snyk leverages AI and large language models to enhance vulnerability detection, reducing manual analysis and information overload for security experts. Discover how AI-powered classification and fix commit analysis improve accuracy and speed in identifying security threats.

Article

RAG vs CAG: Key Differences in AI Generation Strategies

Compare RAG vs CAG AI generation strategies. Learn key differences, trade-offs in accuracy & latency, and choose the best approach for enhancing LLMs with external data.

Article

AI Risk Assessment Strategies, Best Practices and Tools

As AI adoption accelerates, so do the risks. This article explores crucial AI risk assessment strategies, from identifying threats to implementing best practices and leveraging essential tools for secure and responsible AI.

Article

How to Run MCP Servers with Docker

Struggling with local MCP server installations and security concerns? Discover how Docker can simplify deployment, enhance security, and streamline your workflow. Includes examples for tools like Qodo Gen.

Article

How to Add a New MCP Server to Cursor

Learn how to configure MCP Servers in the Cursor AI code assistant. Enhance your agentic development workflow by adding global or project-specific servers.

Article

How to Build an MCP Server in Node.js to Provide Up-To-Date API Documentation

Learn how to build a basic MCP Server in Node.js using the official Anthropic Model Context Protocol (MCP) SDK in this tutorial.

Article

How to Debug MCP Server with Anthropic Inspector

Learn to debug your Anthropic MCP server with the official MCP Inspector. Start with a simple Node.js example and use the MCP Inspector UI to inspect and interact with your server's tools. Discover practical debugging tips and workarounds.

Article

Vibe Coding a Node.js File Upload API Results in Security Vulnerability

Explore the productivity promises of AI code generation using ChatGPT to build a Node.js file upload API. As security vulnerabilities easily slip in, Snyk can help developers, regardless of their background, catch and fix these risks, ensuring secure application delivery.

Article

Prompt Injection Exploits Invisible PDF Text to Pass Credit Score Analysis by LLMs

We leverage LLMs for a real-world use case that financial banking applications might use to understand the real business impact of adversarial AI security regarding prompt injection.

Article

LLM Weaponized via Prompt Injection to Generate SQL Injection Payloads

Think your AI financial assistant is harmless? Learn how LLMs can be tricked via prompt injection to generate SQL injection payloads, weaponizing your application. Discover how insecure coding practices expose you and how Snyk can help detect and fix these dangerous vulnerabilities.

Article

Ensuring Safe and Reliable AI Interactions with LLM Guardrails

Explore LLM guardrails, why they matter, and how you can effectively implement them to ensure safe and trustworthy AI interactions.

Article

7 MCP Servers for Product Managers

Discover 7 Model Context Protocol (MCP) servers that connect AI assistants like ChatGPT to your product management tools. Streamline workflows for issue tracking, feature flags, analytics, and CRM, enhancing productivity and insights.

Article

ChatGPT Coding Security For Enterprises: Risks, Uses, and Best Practices

ChatGPT security risks include data leaks, AI-powered phishing, and compliance issues. Learn how enterprises can mitigate threats and use AI safely.

Article

What Is Shadow AI? Preventing and Managing AI Risks

Explore the growing risks of shadow AI in software development. Learn about the common AI tools used in shadow AI, the associated risks, and how to implement the necessary security measures.

Article

The Future of Web Application Security: 4 Trends for Organizations to Stay Ahead

Explore the future of web application security—AI-driven defense, automation, Zero Trust, and proactive strategies to stay ahead of evolving threats.

Article

What is an AI Accelerator, and How Does it Work?

Discover how AI accelerators improve AI performance, from training models to real-time inference. Learn about the key types of AI accelerators, their benefits, and the challenges of integration. Explore how Snyk can help secure your AI-generated code and ensure safe deployment.

Article

What is a Data Poisoning Attack?

It’s important to protect AI models from data poisoning, an attack that injects corrupt data. Learn key strategies to detect, prevent, and mitigate risks.

Article

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Article

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.

Article

What is RAG, and How to Secure It

Learn how Retrieval-Augmented Generation improves LLMs with your data. Understand critical RAG security risks & discover best practices to protect your AI.