Stack Verification
Testing Mermaid and Shiki
Kubernetes administration, cloud infrastructure, security research, and platform engineering
Testing Mermaid and Shiki
Deep dive into Kubernetes RBAC misconfigurations and how to properly implement least privilege access control
Analyzing modern container breakout methods and defensive strategies for securing containerized environments
Understanding and mitigating risks from compromised base images, dependencies, and build pipelines
Technical breakdown of API server authentication vulnerabilities and exploitation techniques