// Code Glimpse

Byte-sized insights into software development, AI, and the future of technology.

Cybersecurity & Trust

Verifying Sigstore Fulcio Certificates For Slsa 4 Provenance In Ci

The problem that got me curious I hit a weird failure in a CI pipeline that “looked secure” on paper: the pipeline was verifying artifacts, but it w...

Apr 3, 2026Read more
Infrastructure & Scale

A Deterministic Ci/Cd Gate For Aws Codebuild That Blocks “Heisenbugs” Via Content-Addressed Docker Layers

The problem I ran into: “green” builds that later explode I recently helped wire a CI/CD pipeline for a distributed cloud platform, and everything lo...

Apr 3, 2026Read more
Distributed Systems & Cryptography

Aave V3 Risk For Erc4626 Vaults Using “Virtual Shares” Mispricing

The problem I stumbled into I spent a weekend trying to wire an ERC4626 vault into a DeFi portfolio and then feed its “share price” into an Aave v3 ...

Apr 3, 2026Read more
Edge Computing & Physical AI

Building A Markerless “Floor Compass” For Ar Using Real Camera Motion Only

The problem I stumbled into I got hooked on spatial computing because it lets you make digital content react to the real world. The part that surpri...

Apr 3, 2026Read more
Data Science

Building A Streaming “Monotonic Timestamp” Guardrail In Kafka Connect

Building a Streaming “Monotonic Timestamp” Guardrail in Kafka Connect A weird class of incidents kept biting me in real-time pipelines: event times ...

Apr 3, 2026Read more
Edge Computing & Physical AI

Edge Vision For Predicting Conveyor Belt Tear Using Tiny Yolov8 And Imu Correlation

Edge Vision for Predicting Conveyor Belt Tear Using Tiny YOLOv8 and IMU Correlation A couple weekends ago I got pulled into a frustrating smart-manu...

Apr 3, 2026Read more
Infrastructure & Scale

Deterministic Ephemeral Review Apps By Git Commit Digest In Kubernetes

The problem I ran into: “same PR” but different infrastructure drift I was building a platform engineering workflow for ephemeral review apps (short...

Apr 3, 2026Read more
Distributed Systems & Cryptography

Air-Gapped Receipt Provenance With Merkleized Attachment Hash Chains

The problem I wanted to solve I once had to prove that a printed, scanned receipt image hadn’t been altered between a vendor’s laptop and an offline ...

Apr 3, 2026Read more
Core Engineering

Split Brain Avoidance For Subdomain Cookie Auth In Edge-Rendered Next.Js

The bug I chased: “login works on one subdomain, breaks on the other” I ran into a weird authentication failure while building a setup like this: - ...

Apr 3, 2026Read more
Infrastructure & Scale

Hardening A Github Actions Oidc Token Refresh Pipeline For Kubernetes With Ttl=0

I ran into a weird CI/CD failure that looked like an “auth problem,” but it wasn’t. The symptoms were consistent: GitHub Actions would authenticate to...

Apr 3, 2026Read more
Edge Computing & Physical AI

Edge Device Sentinels Using Modbus Heat-Map Alarms For Cnc Spindle Microstalls

I got curious about a super specific failure mode in smart manufacturing: microstalls on a CNC spindle—those tiny hesitations that don’t trip the obvi...

Apr 3, 2026Read more