Join us

ContentUpdates from The Open Source Security Foundation (OpenSSF) is a...
Link
@kaptain shared a link, 2 weeks, 5 days ago
FAUN.dev()

LLMs on Kubernetes: Same Cluster, Different Threat Model

Running LLMs on Kubernetes opens up a new can of worms - stuff infra hardening won’t catch. You need a policy-smart gateway to vet inputs, lock down tool use, and whitelist models. No shortcuts. This post drops a reference gateway build usingmirrord(for fast, in-cluster tinkering) andCloudsmith(to t.. read more  

LLMs on Kubernetes: Same Cluster, Different Threat Model
Link
@kaptain shared a link, 2 weeks, 5 days ago
FAUN.dev()

The State of Java on Kubernetes 2026: Why Defaults are Killing Your Performance

Akamas just dropped fresh numbers: over60% of Java apps running on Kubernetesstick with default JVM settings. That means sluggish memory use, GC thrash, and CPUs getting choked out. Even with "container-friendly" Java builds out there, most teams still skip setting GC types or heap sizes. Kubernetes.. read more  

The State of Java on Kubernetes 2026: Why Defaults are Killing Your Performance
Link
@kaptain shared a link, 2 weeks, 5 days ago
FAUN.dev()

Migrating from Slurm to Kubernetes

SkyPilot drops a clean interface that blendsSlurmwithKubernetes. AI/ML teams get to keep their Slurm-style comforts - job scripts, gang scheduling, GPU guarantees, interactive workflows - but pick up Kubernetes perks like container isolation and rich ecosystem hooks. It handles the messy bits: pods,.. read more  

Migrating from Slurm to Kubernetes
Link
@kaptain shared a link, 2 weeks, 5 days ago
FAUN.dev()

Zero-Downtime Ingress Controller Migration in Kubernetes

Ingress-nginxis heading for the exits - end-of-life drops March 2026. That puts Kubernetes operators on the hook to swap in a new ingress controller. The migration path? Run both old and new in parallel. Use DNS cutover. Point explicitly with Ingress classes. Done right, the switchover hits zero dow.. read more  

Zero-Downtime Ingress Controller Migration in Kubernetes
Link
@kala shared a link, 2 weeks, 5 days ago
FAUN.dev()

YOLO Mode: Hidden Risks in Claude Code Permissions

A scrape of 18,470 Claude Code configs on GitHub shows a pattern: developers are handing their AI agents the keys to the castle. Unrestricted file, shell, and network accessis common. Among them: - 21.3% let Claude runcurl - 14.5% allowarbitrary Python execution - 19.7% give itgit pushprivileges Tha.. read more  

YOLO Mode: Hidden Risks in Claude Code Permissions
Link
@kala shared a link, 2 weeks, 5 days ago
FAUN.dev()

GPT-5.2 derives a new result in theoretical physics

GPT-5.2 Pro spotted something wild: a nonzero gluon scattering amplitude in the half-collinear regime. That’s supposed to vanish, according to standard QFT gospel. Not anymore. OpenAI’s own model backed it up with a formal proof. Humans triple-checked it analytically. And yep - it holds. Now it’s bl.. read more  

GPT-5.2 derives a new result in theoretical physics
Link
@kala shared a link, 2 weeks, 5 days ago
FAUN.dev()

Why Trying to Secure OpenClaw is Ridiculous

OpenClaw, an open-source autonomous AI agent with full device access, racked up 179K GitHub stars - and walked straight into a security nightmare. It shipped wide open: default ports exposed to the internet, its plugin hub laced with malicious packages. Slapped-on fixes followed, warning labels, Vir.. read more  

Why Trying to Secure OpenClaw is Ridiculous
Link
@kala shared a link, 2 weeks, 5 days ago
FAUN.dev()

Adventures in Neural Rendering

A graphics dev took a swing at encoding rendering signals - radiance, irradiance, depth, AO, BRDFs - using tightMLPs in HLSL. They benchmarked size, storage, and runtime cost. Turns out, MLPs beatL2 spherical harmonicsfor packing radiance. But they stumble on irradiance and specular BRDFs. Bring inR.. read more  

Adventures in Neural Rendering
Link
@kala shared a link, 2 weeks, 5 days ago
FAUN.dev()

Building a TUI is easy now

Hatchet usedClaude Code, a terminal-native coding agent, to build and ship a real TUI-based workflow manager - fast. Like, days-fast. Powered by theCharm stack(Bubble Tea, Lip Gloss, Huh), it leans hard into CLI-heavy development. Claude Code handled live testing intmux, whipped up frontend views fr.. read more  

Building a TUI is easy now
Link
@devopslinks shared a link, 2 weeks, 5 days ago
FAUN.dev()

The future of software engineering is SRE

Agentic coding and no-code tools are everywhere now. Building features? Easier than ever. The harder part is keeping systems solid once they’re out in the wild. The real game:maintainability, reliability, and evolutionunder real pressure - not just building, but keeping it together over time... read more  

The future of software engineering is SRE
The Open Source Security Foundation (OpenSSF) is an industry-backed foundation focused on strengthening the security of the global open source software ecosystem. It brings together major technology companies, cloud providers, open source communities, and security experts to address systemic security challenges that affect how software is built, distributed, and consumed.

OpenSSF was launched in 2021 and operates under the Linux Foundation, combining efforts from earlier initiatives such as the Core Infrastructure Initiative (CII) and industry-led supply chain security programs. Its mission is to make open source software more trustworthy, resilient, and secure by default, without placing unrealistic burdens on maintainers.

The foundation works across several key areas:

- Supply chain security: Developing frameworks, best practices, and tools to secure the software lifecycle from source to deployment. This includes stewardship of projects like sigstore and leadership on SLSA (Supply-chain Levels for Software Artifacts).

- Security tooling: Supporting and incubating open source tools that help developers detect, prevent, and remediate vulnerabilities at scale.

- Vulnerability management: Improving how vulnerabilities are discovered, disclosed, scored, and fixed across open source projects.

- Education and best practices: Publishing guidance, training, and maturity models such as the OpenSSF Best Practices Badge Program, which helps projects assess and improve their security posture.

- Metrics and research: Advancing data-driven approaches to understanding open source security risks and ecosystem health.

OpenSSF operates through working groups and special interest groups (SIGs) that focus on specific problem areas like securing builds, improving dependency management, or automating provenance generation. This structure allows practitioners to collaborate on concrete, actionable solutions rather than high-level policy alone.

By aligning maintainers, enterprises, and security teams, OpenSSF plays a central role in reducing large-scale risks such as dependency confusion, compromised build systems, and malicious package injection. Its work underpins many modern DevSecOps and cloud-native security practices and is increasingly referenced by governments and enterprises as a baseline for secure software development.