Browsing Tag
security
228 posts
MdBin Levels Up Again: E2E Encryption, Theme Toggle, and Responsive Nav
The Evolution Continues (Again) Last time, I shared how MdBin migrated to Streamdown for better markdown rendering—Mermaid diagrams,…
Zero-Budget Strategies for Avoiding Spam Traps in DevOps
Zero-Budget Strategies for Avoiding Spam Traps in DevOps In the realm of email deliverability, spam traps are notorious…
Mastering Spam Trap Avoidance with DevOps: A Senior Architect’s Approach Amidst Documentation Gaps
Introduction In today’s digital communication landscape, maintaining sender reputation is critical for email deliverability. Spam traps pose a…
Optimizing Test Account Management During High Traffic Events with SQL Security Techniques
Managing test accounts efficiently during high traffic events is a critical challenge for security researchers and engineering teams…
Passkeys vs. Access-First: The Shift from Login to Lifecycle
If you are building modern systems, you have probably heard this question: “How do access-first systems compare to…
Clawdbot/Moltbot security issues.
Hey Everyone, you might have heard of Moltbot, a project that has fantastic promises. Delivering agents locally to…
Securing AI Skills
If you give an AI system the ability to act, you give it risk. In earlier posts, I…
CVE-2026-0798: Gitea’s Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers
Gitea’s Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers Vulnerability ID: CVE-2026-0798 CVSS Score: 3.5…
AI-Assisted Coding Requires Constraints
The rapid adoption of AI-assisted coding is reshaping how software is produced and deployed. In 2026, AI-assisted coding…
CVE-2025-13465: Lodash: The Delete Button for the Universe (CVE-2025-13465)
Lodash: The Delete Button for the Universe (CVE-2025-13465) Vulnerability ID: CVE-2025-13465 CVSS Score: 6.9 Published: 2026-01-21 A prototype…