Logo
Log in
Subscribe
Secure Patterns

Secure Patterns

Patterns for building secure products and scalable security platforms

OAuth Token Storage: Securing Third-Party Credentials in Multi-Tenant SaaS

Apr 15, 2026

•

6 min read

OAuth Token Storage: Securing Third-Party Credentials in Multi-Tenant SaaS

A secure pattern for storing, refreshing, and using customer OAuth credentials

Mahesh Kukreja
Mahesh Kukreja
Designing API Idempotency Keys to Prevent Duplicate Writes

Apr 8, 2026

•

15 min read

Designing API Idempotency Keys to Prevent Duplicate Writes

How to prevent duplicate writes, partial-failure bugs, and replayed side effects

Mahesh Kukreja
Mahesh Kukreja
Threat Modeling RAG Access Control

Apr 1, 2026

•

13 min read

Threat Modeling RAG Access Control

A practical threat model for tenant isolation, ACL propagation, revocation, and query-time filtering

Mahesh Kukreja
Mahesh Kukreja
Secure Webhook Delivery: Signing, Verification, and SSRF Prevention

Mar 25, 2026

•

10 min read

Secure Webhook Delivery: Signing, Verification, and SSRF Prevention

A practical pattern for sender controls, receiver verification, and outbound request safety

Mahesh Kukreja
Mahesh Kukreja
The AI Agent Attack Surface: Tools, Loops, and Memory

Mar 18, 2026

•

13 min read

The AI Agent Attack Surface: Tools, Loops, and Memory

Threat models and safe defaults for tool execution, autonomous loops, and persistent memory in AI agents

Mahesh Kukreja
Mahesh Kukreja
Passkey Authentication: Architecting a Secure Relying Party

Mar 5, 2026

•

11 min read

Passkey Authentication: Architecting a Secure Relying Party

Mahesh Kukreja
Mahesh Kukreja
Load more

Secure Patterns

Patterns for building secure products and scalable security platforms

© 2026 Secure Patterns.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv