Technical Blog
- Running SecureVibes on SecureVibes - Results & What's Next (Part 3/3)
- Building SecureVibes: A Multi-Agent Security System (Part 2/3)
- The Vibecoding Security Crisis: Why Current Scanners Fail (Part 1/3)
- Introducing SecureVibes: A Multi-Agent Security System (3 Part Series)
- How to build a defensive AI security agent with RAG
- How to build an offensive AI security agent
- The Future of Application Security: Integrating LLMs and AI Agents into Manual Workflows
- A Guide To Identify Authorization Vulnerabilities At Scale Using Semgrep
- A Guide On Implementing An Effective SAST Workflow
- A Lightweight Approach To Implement Secure Software Development LifeCycle (Secure SDLC)
- Product Security Roadmap
- Building a Product Security program from scratch
- Ability to send payment requests inspite of being blocked by the recipient
- A CSRF protection bypass technique
- A bug in Facebook that violated my privacy
- Analysis of the BrowserStack breach - A classic example of "Pivoting in the Clouds"
- Security issues with friction-less signup flows
- Performing code review on shell scripts