Technical Blog
- Day in the Life: Building a Prototype with My AI Agent (Without Getting Pwned)
- Browser Relay: When Your AI Assistant Gets Hands on Your Browser
- Skills: The Missing Piece in AI Security Tooling
- How I Prompted My Personal AI Assistant to Write a Blog For Me
- Introducing Sage: My Personal AI Assistant That Actually Works
- Running SecureVibes on SecureVibes - Results & What's Next (Part 3/3)
- Building SecureVibes: A Multi-Agent Security System (Part 2/3)
- The Vibecoding Security Crisis: Why Current Scanners Fail (Part 1/3)
- Introducing SecureVibes: A Multi-Agent Security System (3 Part Series)
- How to build a defensive AI security agent with RAG
- How to build an offensive AI security agent
- The Future of Application Security: Integrating LLMs and AI Agents into Manual Workflows
- A Guide To Identify Authorization Vulnerabilities At Scale Using Semgrep
- A Guide On Implementing An Effective SAST Workflow
- A Lightweight Approach To Implement Secure Software Development LifeCycle (Secure SDLC)
- Product Security Roadmap
- Building a Product Security program from scratch
- Ability to send payment requests inspite of being blocked by the recipient
- A CSRF protection bypass technique
- A bug in Facebook that violated my privacy
- Analysis of the BrowserStack breach - A classic example of "Pivoting in the Clouds"
- Security issues with friction-less signup flows
- Performing code review on shell scripts