Articles on Tools
Below are my perspectives on Tools, drawn from my work as a security leader and practitioner.
- Tools Build a Decoy MCP Server to Catch AI Agent Attackers Your AI agent's MCP config can be a target for an attacker who reaches your machine. A decoy MCP server entry pointing at a Cloudflare Worker can reveal the attacker's presence and their intent.
- Tools Plant Honeytokens to Detect Intrusions Plant decoy credentials, configs, and URLs to surface an attack the rest of your stack might miss. Deployment scenarios include MCP server entries, AWS API keys, and Cloudflare Workers serving fake...
- Tools The Personal AI Stack: A Power User's Guide An AI tool like Claude Code gives you solid general-purpose capabilities out of the box. To make it truly indispensable, add the layers that teach it who you are, how you work, and what you do.
- Communication Interactive Replays of Conversations: A New Tool Conversation replays add an engaging dimension to training materials and docs. Save the conversation and your annotations in a data file, then use my tool to generate a self-contained HTML player you...
- Tools Publishing Your Content to AI Assistants People asking AI assistants about your product or project often get outdated answers. An MCP server gives AI tools direct access to your up-to-date content. Try this approach with my MCP server for...
- Malware The History of Fileless Malware - Looking Beyond the Buzzword The term "fileless malware" originated with Code Red worm in 2001 and initially meant malware that remained solely in memory. It evolved to encompass specimens that avoid placing malicious...