Build Log
Week 3 of building X: what broke, what changed, what I am trying next.
Notes
I use this section as a technical notebook: experiments, wrong turns, reversals, and occasional wins.
Week 3 of building X: what broke, what changed, what I am trying next.
A technical rabbit hole worth mapping end-to-end.
I reverse engineered X to understand Y.
What failed, why it failed, and how I changed the system.
Things I was wrong about this month.
Short, fast discoveries worth remembering.
Featured
A few notes across security, systems, and engineering practice.
How a multi-year social engineering campaign embedded a backdoor in xz Utils that hijacked OpenSSH authentication on Linux systems.
A long-form reflection on why Linux won and what that teaches about leadership, engineering, and product momentum. Practical lessons for builders who ship, iterate, and grow communities.
A curated set of custom Wazuh decoders and rules for the detections that built-in rules miss — with MITRE mappings and ready-to-deploy XML.
A kernel panic recovery story and the engineering mindset that makes Linux failures fixable.
Operating LLMs locally can help analysts summarize and triage sensitive telemetry without shipping data to third-party services.
A practical workflow for isolating slow SSH sessions by separating DNS, TCP, and authentication latency.
Archive
Feb 26, 2026
After upgrading the Wazuh manager, OpenSearch-authenticated admins silently lose all permissions. Here is why it happens and how to fix it permanently.
Read the noteFeb 13, 2026
How a 25-year-old Bash parsing bug allowed remote code execution through environment variables, and why it took multiple patches to fix.
Read the noteJan 23, 2026
How a message interpolation feature in Log4j turned every Java application into an unauthenticated RCE target, and what the response revealed about software supply chains.
Read the noteOct 3, 2025
Exceptions feel harmless in the moment. Over time they become the slow leak that drains security programs.
Read the noteSep 19, 2025
Turning infrastructure into a product is less about technology and more about clarity, ownership, and trust.
Read the noteSep 5, 2025
Security architecture defines the promises; security operations keeps them. When those two drift, the organization pays the bill.
Read the noteAug 29, 2025
Techniques for crafting exploit payloads when buffer space is limited, bad characters are abundant, and mitigations restrict your options.
Read the noteAug 22, 2025
Techniques for crafting position-independent shellcode that avoids null bytes and other bad characters.
Read the noteOct 24, 2024
Pre-commit hooks catch formatting, lint, and secret issues before code leaves a laptop, but only if they stay fast and consistent.
Read the noteOct 18, 2024
A stepwise method to debug broken Kubernetes Services by validating selectors, endpoints, DNS, and kube-proxy routing.
Read the noteJul 8, 2024
Fully homomorphic encryption allows computation on encrypted data, but performance and model constraints still define where it is realistic.
Read the noteJun 14, 2024
Upgrading Wazuh 4.8.0 is mostly about compatibility, index management, and keeping agents aligned with the manager and indexer.
2024
Zero Trust is a systems promise, not a slogan. Without automation, the model collapses under its own operational weight.
Read the noteDec 29, 2023
MFA is table stakes, but the details matter: phishing resistance, enrollment flow, recovery, and policy enforcement.
Read the noteAug 23, 2023
FIPS compliance with OpenSSL 3 is about enabling the FIPS provider and proving it is actually in use, not just installed.
Read the note2023
Security controls can increase risk when they create downtime, lockouts, or perverse incentives. Design needs operational reality.
Read the note