An illustration of a centaur at a desk, symbolizing human-AI collaboration.

Feeling Dull in the Age of AI? It's Time to Become a Centaur.

It’s 3:00 PM on a Tuesday, and you’re in a state of flow unlike any you’ve experienced before. In the last hour, you’ve drafted a complex marketing proposal, summarized a dense report, and cleared a backlog of twenty emails. The to-do list shrinks, the work flows effortlessly, and you feel like a superhero of productivity. But this new superpower comes with a subtle trade-off. Later that day, you find yourself reaching for a calculator to figure out a 15% tip. The mental path to the answer feels strangely foggy. The moment leaves a quiet question that sounds a lot like, “Used to be, I could do that in my head.” ...

August 7, 2025 · 5 min · Scott Algatt

A Deep Dive into the Security Implications of AI-Generated Code

A Deep Dive into the Security Implications of AI-Generated Code Section 1: Introduction to AI-Generated Code and its Security Implications The increasing adoption of Artificial Intelligence (AI) in software development has led to the emergence of AI-generated code. This technology has the potential to revolutionize the way we develop software, but it also raises significant security concerns. In this article, we will delve into the security implications of AI-generated code, exploring the benefits and risks associated with this technology. ...

July 18, 2025 · 8 min · Scott

A Deep Dive into Google's Gemini CLI: Local AI Model Execution

A Deep Dive into Google’s Gemini CLI: Local AI Model Execution Introduction Google’s Gemini CLI is a powerful, open-source AI agent designed to bring Google’s Gemini models directly into the terminal. This tool allows developers to interact with advanced AI models through natural language prompts, enabling a wide range of tasks beyond traditional coding. In this article, we’ll delve into the features, capabilities, and applications of Gemini CLI, exploring its potential to revolutionize developer productivity and democratize AI. ...

July 1, 2025 · 3 min · Scott

Production Passkey Implementation: WebAuthn/FIDO2 Security Analysis and Complete Code

Research Disclaimer This tutorial is based on: W3C WebAuthn Level 3 Specification (October 2024) FIDO2/CTAP2 specification (FIDO Alliance, 2023) @simplewebauthn/server v9.0+ (Node.js library) py_webauthn v2.0+ (Python library) Web Crypto API (W3C standard) NIST SP 800-63B Digital Identity Guidelines All code examples follow documented WebAuthn best practices and are production-ready. Security analysis is based on FIDO Alliance and W3C standards. Examples tested on Chrome 119+, Safari 17+, Firefox 120+, Edge 119+. ...

June 24, 2025 · 18 min · Scott
AI and cybersecurity concept art

AI-Powered Code Security: Production Vulnerability Scanning with OpenAI API

⚠️ Update Notice (October 2025) Lambda Inference API Deprecation: This post was originally written for Lambda Labs’ Inference API, which was deprecated on September 25, 2025. All code examples have been updated to use the OpenAI API with GPT-4, which provides similar or superior vulnerability detection capabilities. The core concepts, methodologies, and security patterns remain unchanged. Alternative Providers: The patterns demonstrated here work with any OpenAI-compatible API, including: OpenAI (GPT-4, GPT-4-Turbo) Together AI (various open models) Anthropic (Claude models via different SDK) Azure OpenAI Service (enterprise deployments) Research Disclaimer This tutorial is based on: ...

June 10, 2025 · 28 min · Shellnet Security