Skip to main content

Resources

Report

2026 State of Agentic AI Adoption

Read now

White paper

From First Prompt to Final Fix: How Snyk Secures AI-Driven Development

Read now

Report

Unifying Control for Agentic AI With Evo By Snyk

Read now

Article

From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills

Read now
Type
Topic

Showing 145 - 168 of 353 resources

Article

Enhanced Vulnerability Detection with AI

Snyk leverages AI and large language models to enhance vulnerability detection, reducing manual analysis and information overload for security experts. Discover how AI-powered classification and fix commit analysis improve accuracy and speed in identifying security threats.

Article

RAG vs CAG: Key Differences in AI Generation Strategies

Compare RAG vs CAG AI generation strategies. Learn key differences, trade-offs in accuracy & latency, and choose the best approach for enhancing LLMs with external data.

Article

AI Risk Assessment Strategies, Best Practices and Tools

As AI adoption accelerates, so do the risks. This article explores crucial AI risk assessment strategies, from identifying threats to implementing best practices and leveraging essential tools for secure and responsible AI.

Article

How to Run MCP Servers with Docker

Struggling with local MCP server installations and security concerns? Discover how Docker can simplify deployment, enhance security, and streamline your workflow. Includes examples for tools like Qodo Gen.

Article

How to Add a New MCP Server to Cursor

Learn how to configure MCP Servers in the Cursor AI code assistant. Enhance your agentic development workflow by adding global or project-specific servers.

Article

How to Build an MCP Server in Node.js to Provide Up-To-Date API Documentation

Learn how to build a basic MCP Server in Node.js using the official Anthropic Model Context Protocol (MCP) SDK in this tutorial.

Article

How to Debug MCP Server with Anthropic Inspector

Learn to debug your Anthropic MCP server with the official MCP Inspector. Start with a simple Node.js example and use the MCP Inspector UI to inspect and interact with your server's tools. Discover practical debugging tips and workarounds.

Article

Vibe Coding a Node.js File Upload API Results in Security Vulnerability

Explore the productivity promises of AI code generation using ChatGPT to build a Node.js file upload API. As security vulnerabilities easily slip in, Snyk can help developers, regardless of their background, catch and fix these risks, ensuring secure application delivery.

Article

Prompt Injection Exploits Invisible PDF Text to Pass Credit Score Analysis by LLMs

We leverage LLMs for a real-world use case that financial banking applications might use to understand the real business impact of adversarial AI security regarding prompt injection.

Article

LLM Weaponized via Prompt Injection to Generate SQL Injection Payloads

Think your AI financial assistant is harmless? Learn how LLMs can be tricked via prompt injection to generate SQL injection payloads, weaponizing your application. Discover how insecure coding practices expose you and how Snyk can help detect and fix these dangerous vulnerabilities.

Article

Ensuring Safe and Reliable AI Interactions with LLM Guardrails

Explore LLM guardrails, why they matter, and how you can effectively implement them to ensure safe and trustworthy AI interactions.

Article

7 MCP Servers for Product Managers

Discover 7 Model Context Protocol (MCP) servers that connect AI assistants like ChatGPT to your product management tools. Streamline workflows for issue tracking, feature flags, analytics, and CRM, enhancing productivity and insights.

Article

ChatGPT Coding Security For Enterprises: Risks, Uses, and Best Practices

ChatGPT security risks include data leaks, AI-powered phishing, and compliance issues. Learn how enterprises can mitigate threats and use AI safely.

Article

What Is Shadow AI? Preventing and Managing AI Risks

Explore the growing risks of shadow AI in software development. Learn about the common AI tools used in shadow AI, the associated risks, and how to implement the necessary security measures.

Article

The Future of Web Application Security: 4 Trends for Organizations to Stay Ahead

Explore the future of web application security—AI-driven defense, automation, Zero Trust, and proactive strategies to stay ahead of evolving threats.

Article

What is an AI Accelerator, and How Does it Work?

Discover how AI accelerators improve AI performance, from training models to real-time inference. Learn about the key types of AI accelerators, their benefits, and the challenges of integration. Explore how Snyk can help secure your AI-generated code and ensure safe deployment.

Article

What is a Data Poisoning Attack?

It’s important to protect AI models from data poisoning, an attack that injects corrupt data. Learn key strategies to detect, prevent, and mitigate risks.

Article

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Article

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.

Article

What is RAG, and How to Secure It

Learn how Retrieval-Augmented Generation improves LLMs with your data. Understand critical RAG security risks & discover best practices to protect your AI.

Article

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

Article

Achieving Security Coverage and Control Over Application Risk

Stop reacting to vulnerabilities. Build proactive application security with universal asset visibility, smart policies, and risk-based prioritization. Secure your SDLC.

Article

OWASP Top 10 Code Vulnerabilities and How SAST Can Stop Them

Discover the OWASP Top 10 vulnerabilities and how SAST tools like Snyk Code empower developers to detect and fix them early in the development lifecycle.

Article

Navigating the Challenges of GenAI Adoption for Modern AppSec Teams

With an increase in GenAI adoption, AppSec teams face challenges. Learn what challenges AppSec teams are facing and how they can address risks with Snyk.