Feeling overwhelmed by AI? Learn the Centaur Mindset. Read More
A security operations center with AI-assisted threat detection visualization

Building AI-Assisted Security Tools

This is Part 2 of “The Centaur’s Toolkit” series. In Part 1, we covered the four collaboration modes for AI pair programming. Now we apply that framework to higher-stakes territory: security. You’ve embraced AI pair programming. You’re using Strategist mode for architecture, Editor mode for refinement, and you feel like a genuine Centaur. Then your manager asks you to build a security tool. Suddenly, the stakes feel different. In regular coding, an AI-suggested bug might waste a few hours of debugging. In security, an AI-suggested bug might become a vulnerability that sits in production for months. The cost of being wrong isn’t just time. It’s trust, data, and potentially your users’ safety. ...

January 10, 2026 · 10 min · Scott Algatt

Using AI to Analyze Log Files for Security Threats

Research-Based Guide: This post synthesizes techniques from security research, documentation, and established practices in AI-powered log analysis. Code examples are provided for educational purposes and should be tested in your specific environment before production use. The Log Analysis Challenge Modern systems generate massive amounts of log data. A typical web server might produce thousands of log entries per hour, while enterprise infrastructure can generate millions of events daily. Traditional log analysis approaches—grep commands, regex patterns, and manual review—simply don’t scale. ...

November 9, 2025 · 8 min · Scott

Production Passkey Implementation: WebAuthn/FIDO2 Security Analysis and Complete Code

Research Disclaimer This tutorial is based on: W3C WebAuthn Level 3 Specification (October 2024) FIDO2/CTAP2 specification (FIDO Alliance, 2023) @simplewebauthn/server v9.0+ (Node.js library) py_webauthn v2.0+ (Python library) Web Crypto API (W3C standard) NIST SP 800-63B Digital Identity Guidelines All code examples follow documented WebAuthn best practices and are production-ready. Security analysis is based on FIDO Alliance and W3C standards. Examples tested on Chrome 119+, Safari 17+, Firefox 120+, Edge 119+. ...

June 24, 2025 · 18 min · Scott

Revolutionizing Vulnerability Discovery with AI-Powered Fuzzing

Revolutionizing Vulnerability Discovery with AI-Powered Fuzzing =========================================================== Introduction Fuzzing is an automated testing technique used to discover security vulnerabilities in software and protocols by providing invalid or unexpected input. With the increasing complexity of systems and the internet of things (IoT), traditional fuzzing methods are becoming less effective. Artificial intelligence (AI) can be used to enhance fuzzing techniques, making them more efficient and effective. In this article, we will explore the concept of fuzzing with AI and its applications in vulnerability discovery. ...

March 31, 2025 · 4 min · Scott

Securing AI-Generated Code: Production Workflows and Security Scanning

Research Disclaimer This tutorial is based on: Semgrep v1.55+ (SAST scanning) Bandit v1.7+ (Python security linter) CodeQL v2.15+ (GitHub Advanced Security) SonarQube v10.3+ (code quality & security) Academic research on AI code generation security (NYU 2023 study, Stanford 2024 study) OWASP Top 10 2021 vulnerability classifications All code examples demonstrate production-grade security scanning integrated into CI/CD pipelines. Tested with GitHub Actions, GitLab CI, and Jenkins. Security recommendations follow OWASP and NIST guidelines. ...

March 5, 2025 · 12 min · Scott