Manwendra Mishra
16 posts
16 Patterns for Crossing the WebAssembly Boundary (And the One That Wants to Kill Them All)
WebAssembly is fast. We all know that by now. What almost nobody talks about is the hidden toll…
The Prompt Injection Problem: A Guide to Defense-in-Depth for AI Agents
TL;DR Prompt injection is an architecture problem, not a benchmarking problem. Anthropic’s Sonnet 4.6 system card shows 8%…
From Moltbot to OpenClaw: When the Dust Settles, the Project Survived
Clawdbot / Moltbot / OpenClaw — Part 4 TL;DR After a chaotic rebrand, account hijackings, crypto scams, and…
What is Data Remanence?
Data Remanence is the residual representation of digital data that remains even after attempts have been made to…
Exploring the Intersection of Cyberwarfare and Open Source License Compliance
Abstract In today’s digital battlefield, cyberwarfare and open source license compliance have become inextricably linked. This blog post…
Removability And Repairability Of WPC Door Frames
With the development of the construction industry, the choice of window and door materials becomes more and more…
ES2015 (ES6) Tips, Tricks, Best Practices, and Code Snippet Examples for Your Day-to-Day Workflow
ES6 (ECMAScript 2015) brought a significant overhaul to JavaScript, introducing numerous new features that can streamline your coding…
Django project with Docker and Kubernetes
To set up a simple Django project with Docker and Kubernetes, follow these steps: Create a Django Project…
For intricate state handling, try out the useReducer() Hook
So, lately, I have been working on a form component. It was a registration form that had quite…
Build Your Own Uptime Monitor with MeteorJS + Fetch + Plotly.js ☄️🔭
In this tutorial I’ll going to show you how to create your own uptime monitor in six easy…