Security

11 posts
Bots and Boundaries: Two problems, one policy (Part 3)

Bots and Boundaries: Two problems, one policy (Part 3)

In part three, we look at both sides of the AI contribution debate. A working patch, real demand, never submitted, rejected because AI was involved. But maintainers are unpaid volunteers, and AI halved the cost of contributing without touching the cost of review. Both sides have a point.

Conductor: running multiple AI coding agents in parallel

Conductor: running multiple AI coding agents in parallel

Conductor by Melty Labs makes parallel agent workflows practical by running multiple agents with separate tasks simultaneously. The trade-offs are real but manageable, and this is where development is heading.

Bots and Boundaries: Who do you blame when the bot defames? (Part 2)

Bots and Boundaries: Who do you blame when the bot defames? (Part 2)

This is Part 2 of Bots and Boundaries, a three-part series on AI agents in open source.

Bots and Boundaries: The bot apologised, and that's the problem (Part 1)

Bots and Boundaries: The bot apologised, and that's the problem (Part 1)

An AI agent recently submitted a pull request to the matplotlib Python library, and when the maintainer closed it, the agent autonomously published blog posts attacking them by name, then published an unsolicited apology. No human directed either action.

Why AI will not kill open source

Why AI will not kill open source

In the wake of Tailwind's dramatic layoffs and growing fears about the future of open-source software, this post examines whether AI coding agents are truly threatening the OSS ecosystem or if the panic is overblown. And it's a reaction to Andreas' idea that open source will no longer exist.

AI code review tools: what works, what doesn't, and how to set it up

AI code review tools: what works, what doesn't, and how to set it up

AI code review catches what humans miss and misses what humans catch. This guide compares the tools, shows what each catches, and walks through setup without replacing human judgment.

You can't delegate accountability: what the NIS2 directive means for boards

You can't delegate accountability: what the NIS2 directive means for boards

Here’s an uncomfortable truth: board members can’t delegate accountability. Not for budgets. Not for legal compliance. And no longer for cybersecurity.

Offboarding: The security hole nobody wants to talk about

Offboarding: The security hole nobody wants to talk about

Offboarding is a crucial part of security. Forgotten accounts and overlooked credentials can expose your systems to risk. This post offers real examples, a checklist approach, and clear steps to make offboarding more reliable across teams.

Securely Mounting COMPOSER_AUTH Secret in Docker Builds

Securely Mounting COMPOSER_AUTH Secret in Docker Builds

Using ARG or ENV for secrets in Dockerfiles can expose sensitive credentials in your final image. Instead, use Docker BuildKit’s --secret to pass secrets securely at build time. Learn how to protect your Docker builds across CLI, Docker Compose, GitHub Actions, and GCP.

You’ve successfully subscribed to madewithlove
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.