News
I Wrapped ClamAV for Node.js So You Don't Have To
The reason is friction. ClamAV, the de facto open-source antivirus engine, does not have a clean Node.js interface. If you want to...
The "Audited" Badge Is Lying to You
Two exploits — Kelp DAO ($292M) and Drift ($285M) — drained $760 million from DeFi in early 2026 without breaking a single smart c...
We Built Bank-Grade Security for Immigrants. Here's What Broke First.
Building fintech for immigrants isn't a design problem — it's a security and infrastructure problem. I share the 3 technical decis...
From Prompts to Harnesses: How AI Engineering Has Grown Up
AI engineering has gone through three stages, and knowing where you are in that progression tells you where to put your energy nex...
AI Is Shipping Your Code. Nobody Told It How Attackers Think.
The vulnerability your AI wrote today probably isn't catastrophic on its own. It's the one that chains with something else.
Most Node.js Apps Using ClamAV Have the Same Bug. Here's What It Is.
Calling ClamAV from Node.js looks easy: spawn clamscan, check the exit code, done. But the standard implementation has a silent bu...
Clampd Earns a 47 Proof of Usefulness Score by Building Zero-Latency Guardrails...
This interview spotlights Clampd, a runtime security layer designed to enforce strict boundaries on autonomous AI agents. Acting a...
Why Secure Infrastructure Is Now a Core Engineering Decision
Secure infrastructure is no longer a secondary IT issue. In engineering operations, it directly affects resilience, remote access,...
How I Fixed Windows Installation - BitLocker, a Write-Protected USB, and the IRS...
Friend's HP laptop locked behind BitLocker — no recovery key, no choice but to reinstall Windows. Three things broke in sequence:...
Your AI Coding Agent Has Read Access to Every Secret in Your Project
AI coding agents can leak secrets by reading .env files and sending them in prompts. Move secrets out of files and inject them at...
Challenges Facing the MCP in 2026: Critical Security, Architectual, and More
This deep dive analyzes the six most critical security, architectural, and cognitive challenges facing MCP today
AI Police Dog Security Simulation Earns a 23.64 Proof of Usefulness Score by Bui...
This interview explores an AI-powered security dog simulation built using Python and Finite State Machine logic to model autonomou...
