Representative Foreword

After the Code, the Structure Remains

The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.

This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

After the Code, the Structure Remains

Detection, Method, Governance

🔥 A Mind That Dissects Systems

🔥 Trust and Culture Beyond Technology

🔥 Code That Fixes, Not Just Runs

The Limitations of 'Secure' SSRF Patches: Advanced Bypasses and Defense-in-Depth

A deep dive into why common SSRF defense code is often incomplete, real-world bypasses, and practical, layered mitigation strategies for developers and security engineers.

June 25, 2025 · 20 min · 4260 words

Dicer Module Vulnerability Mitigation Guide: CVE-2022-24434

Mitigation guide for CVE-2022-24434 in the Dicer module affecting Multer and Express, with practical dependency chain fixes.

May 12, 2025 · 2 min · 343 words

How I Managed Unmaintained Open Source with Gmail and Snyk Alerts

Automating Snyk vulnerability alert management with Google Apps Script and Gmail when official API access falls short.

May 12, 2025 · 5 min · 1049 words

There’s No Such Thing as a Free Lunch, But Security Was Free

The CVE system nearly collapsed in 2025. Who should fund public cybersecurity infrastructure when free-riding is no longer sustainable?

April 17, 2025 · 3 min · 478 words

Common Security Myths Developers Tell Themselves

Debunking developer security myths around responsibility deflection, tech overconfidence, and risk underestimation with real-world examples.

April 1, 2025 · 3 min · 507 words

XML-RPC Security Vulnerabilities Analysis and Mitigation Strategies

Comprehensive analysis of XML-RPC security flaws including RCE, XXE, and DDoS, with mitigation strategies and a Python PoC exploit.

March 28, 2025 · 4 min · 692 words

Common Misconceptions of Security Assessors

Three common misconceptions that weaken security assessments and strategies to build repeatable, effective vulnerability evaluation.

June 16, 2024 · 3 min · 550 words