Patterns for building secure products and scalable security platforms
Apr 15, 2026
•
6 min read
A secure pattern for storing, refreshing, and using customer OAuth credentials
Apr 8, 2026
15 min read
How to prevent duplicate writes, partial-failure bugs, and replayed side effects
Apr 1, 2026
13 min read
A practical threat model for tenant isolation, ACL propagation, revocation, and query-time filtering
Mar 25, 2026
10 min read
A practical pattern for sender controls, receiver verification, and outbound request safety
Mar 18, 2026
Threat models and safe defaults for tool execution, autonomous loops, and persistent memory in AI agents
Mar 5, 2026
11 min read