Security Engineering

Latest

30
Mar

Using Canary Tokens to Detect Sensitive Data Leakage Across Systems

Traditional Canary Tokens vs. Leak-Detection Canaries Traditional canary tokens are planted secrets (e.g. fake API keys, document IDs, or
13 min read
11
Mar

Inheritance-Based Auth: Where It Breaks

In codebases, using secure inheritance checks to enforce authentication and authorization at scale is one of the most trusted approaches.
6 min read
27
Feb

Combining Threat Modeling with Tabletop Exercises for Maximum Results

Usually, threat modeling and tabletop exercises are performed in silos. However, I believe one of the most powerful use cases
6 min read
22
Feb

Semgrep + AI for Infrastructure as Code: Targeted IaC Security Without the Noise

General-purpose AI code scans (Claude Code, Cursor, etc.) are great for broad reviews, but they often skip or under-prioritise infrastructure.
8 min read
19
Feb

Semgrep + LLM for IDOR Detection: Fewer False Positives by Scoping the Review

IDOR (Insecure Direct Object Reference) findings from broad security scans are often noisy. A tool flags every place a user-supplied
6 min read
17
Feb

Bypassing Event Handlers: Using Database Constraints as Last Line of Defence

Many codebases rely on on_change callbacks, Django signals (post_save, pre_save, etc.) or Rails callbacks, etc., to protect
11 min read
27
Oct

Don’t Fire Your Regex Yet: The Hidden Risks of AI-Only WAFs

Background Over the past few months, I have had the opportunity to evaluate several Web Application Firewalls and API security
2 min read