Logo
Search
Login
Sign Up
Oliver Buchannon
Mahesh Kukreja
MCP Tool Poisoning: A Safe Approval Flow for Tool Descriptions

Apr 29, 2026

•

8 min read

MCP Tool Poisoning: A Safe Approval Flow for Tool Descriptions

Tool descriptions are part of the prompt. If that text changes after approval, the tool should stop working until it is reviewed again

Mahesh Kukreja
Mahesh Kukreja
Password Reset Flows: The Secure Implementation Guide

Apr 22, 2026

•

8 min read

Password Reset Flows: The Secure Implementation Guide

Single-Use Tokens, Response Parity, and Session Hygiene

Mahesh Kukreja
Mahesh Kukreja
OAuth Token Storage: Securing Third-Party Credentials in Multi-Tenant SaaS

Apr 15, 2026

•

7 min read

OAuth Token Storage: Securing Third-Party Credentials in Multi-Tenant SaaS

A secure pattern for storing, refreshing, and using customer OAuth credentials

Mahesh Kukreja
Mahesh Kukreja
Designing API Idempotency Keys to Prevent Duplicate Writes

Apr 8, 2026

•

10 min read

Designing API Idempotency Keys to Prevent Duplicate Writes

How to prevent duplicate writes, partial-failure bugs, and replayed side effects

Mahesh Kukreja
Mahesh Kukreja
Threat Modeling RAG Access Control

Apr 1, 2026

•

9 min read

Threat Modeling RAG Access Control

A practical threat model for tenant isolation, ACL propagation, revocation, and query-time filtering

Mahesh Kukreja
Mahesh Kukreja
Secure Webhook Delivery: Signing, Verification, and SSRF Prevention

Mar 25, 2026

•

7 min read

Secure Webhook Delivery: Signing, Verification, and SSRF Prevention

A practical pattern for sender controls, receiver verification, and outbound request safety

Mahesh Kukreja
Mahesh Kukreja
The AI Agent Attack Surface: Tools, Loops, and Memory

Mar 18, 2026

•

9 min read

The AI Agent Attack Surface: Tools, Loops, and Memory

Threat models and safe defaults for tool execution, autonomous loops, and persistent memory in AI agents

Mahesh Kukreja
Mahesh Kukreja
Passkey Authentication: Architecting a Secure Relying Party

Mar 5, 2026

•

7 min read

Passkey Authentication: Architecting a Secure Relying Party

WebAuthn Relying Party Implementation Guide

Mahesh Kukreja
Mahesh Kukreja
AI Agent Gateway: The Authorization Chokepoint

Feb 26, 2026

•

10 min read

AI Agent Gateway: The Authorization Chokepoint

AI Agent Authorization Pattern for Tool Use and MCP

Mahesh Kukreja
Mahesh Kukreja
Kubernetes Workload Identity: Eliminating Static Cloud Credentials

Feb 19, 2026

•

7 min read

Kubernetes Workload Identity: Eliminating Static Cloud Credentials

OIDC Federation for AWS IRSA and GKE Workload Identity

Mahesh Kukreja
Mahesh Kukreja
Multi-Tenant File Sharing: Secure Control Plane Architecture

Feb 11, 2026

•

4 min read

Multi-Tenant File Sharing: Secure Control Plane Architecture

Tenant Isolation for S3 in Multi-Tenant SaaS

Mahesh Kukreja
Mahesh Kukreja
Pre-signed URLs: The Secure Implementation Guide

Feb 9, 2026

•

5 min read

Pre-signed URLs: The Secure Implementation Guide

AWS S3 Pre-Signed URL Best Practices

Mahesh Kukreja
Mahesh Kukreja

Secure Patterns

Patterns for building secure products and scalable security platforms

© 2026 Secure Patterns.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv