The scanner became the attack
March 25, 2026 · 10 min read
On March 19th, thousands of CI/CD pipelines ran a credential stealer. It came from Trivy, the open-source vulnerability scanner they'd installed to protect themselves. Here's what happened, and what it means for every pipeline running security tooling.
Hooking private registries to your Kubernetes cluster
January 10, 2025 · 6 min read
A comprehensive guide to container registry authentication, covering Docker credentials, Kubernetes integration, and cloud-specific implementations (AWS, Azure, GCP). Includes practical troubleshooting steps and managed registry solutions.
From Android to Kubernetes: Give Your OnePlus 6 New Life as a Kubernetes Node
November 29, 2024 · 6 min read
Transform your old OnePlus 6 into a powerful Kubernetes node using PostmarketOS and K3s. A comprehensive guide to mobile edge computing and hardware recycling.