Dwarves
Memo
Pinned Notes
Home
Popular Tags
Dwarves
Memo
0) { selectedRecent = recentPages[0]; selectedSection = 'recents'; }">
🔍 Search
⌘
K
0) { selectedRecent = recentPages[0]; selectedSection = 'recents'; } else { selectedSection = 'welcome'; selectedWelcomeItem = 0; } clearAllSelections(); } else { selectedSection = 'search'; } " @input.debounce.750ms="$dispatch('command-palette-search', { data: $event.target.value })" @command-palette-search-result.window=" searching = false; searchResults = $event.detail.data.grouped; flat = $event.detail.data.flat; if(query.length > 0 && flat.length > 0) { selected = flat[0]; selectedSection = 'search'; clearAllSelections(); } else if (query.length === 0) { if (recentPages.length > 0) { selectedRecent = recentPages[0]; selectedSection = 'recents'; } else { selectedSection = 'welcome'; selectedWelcomeItem = 0; } clearAllSelections(); } " @command-palette-search-initialize.window="searchPlaceholder = $event.detail.text">
on this page
Recents
Welcome to Dwarves Memo
What's been hot lately
See featured posts
Pinned note
View our latest announcement
Actions
Copy memo content
Type
ESC
to close search bar
Reading Mode
+
shift
+
f
security
tags:
security
A
A Holistic Guide to Security
startup
Applied Security Basis
D
Database hardening for a trading platform
blockchain
fintech
H
How I came up with our Security Standard
standardization
P
Prevent prompt injection
llm
ai
S
Securing your remote MCP servers
ai
Security rules
handbook
T
The Key Of Security Mechanisms In Tackling Cyber Threats
engineering
Tool-Level Security for Remote MCP Servers
ai