Join us

ContentUpdates from The Open Source Security Foundation (OpenSSF) is a...
Link
@kaptain shared a link, 3 months, 2 weeks ago
FAUN.dev()

How Kubernetes Became the New Linux

AWS just handed overKarpenterandKubernetes Resource Orchestrator (Kro)to Kubernetes SIGs. Big move. It's less about AWS-first, more about playing nice across the ecosystem. Kroauto-spins CRDs and microcontrollers for resource orchestration.Karpenterhandles just-in-time node provisioning - leaner, fa.. read more  

How Kubernetes Became the New Linux
Link
@kaptain shared a link, 3 months, 2 weeks ago
FAUN.dev()

Docker Workbook - Your Guide to Containerization

This guide cuts through modern Docker workflows. It coversBuildKitfor faster, smarter builds. Shows howmulti-stage Dockerfilesmake images slimmer. Breaks down howENTRYPOINTandCMDactually work. Walks through usingsupervisordto wrangle multi-process containers. Then zooms out toDocker Compose, where l.. read more  

Docker Workbook - Your Guide to Containerization
Link
@kaptain shared a link, 3 months, 2 weeks ago
FAUN.dev()

How I Cut Kubernetes Debugging Time by 80% With One Bash Script

The reality of Kubernetes troubleshooting: 80% of the time is spent locating the issue, while only 20% is used for the fix. Managing eight Kubernetes clusters highlighted this pattern. A tool was developed to provide a complete cluster health report in under a minute, streamlining the process and sa.. read more  

Link
@kaptain shared a link, 3 months, 2 weeks ago
FAUN.dev()

The guide to kubectl I never had.

Glasskube dropped a thorough guide tokubectl- the commands, the flags (--dry-run, etc.), how to chain stuff together, and how to keep your config sane. Bonus: a solid roundup ofkubectl plugins. Think observability (like K9s), policy checks, audit trails, and Glasskube’s take on declarative package m.. read more  

The guide to kubectl I never had.
Link
@kaptain shared a link, 3 months, 2 weeks ago
FAUN.dev()

Kubernetes Tutorial For Beginners [72 Comprehensive Guides]

The series dives deep into real-world Kubernetes - starting with hands-on setup viaKubeadmandeksctl, then moving throughmonitoring,logging,CI/CD, andMLOps. It tracks key release changes up tov1.30, including the confirmed death ofDockershimsince v1.24... read more  

Kubernetes Tutorial For Beginners [72 Comprehensive Guides]
Link
@kaptain shared a link, 3 months, 2 weeks ago
FAUN.dev()

Top 5 hard-earned lessons from the experts on managing Kubernetes

Running Kubernetes in production isn’t just clicking “Create Cluster.” It means locking down RBAC, tightening up network policy, tracking autoscaling metrics, and making sure your images don’t ship with surprises. Managed clusters help get you started. But real workloads need more: hardened configs,.. read more  

Top 5 hard-earned lessons from the experts on managing Kubernetes
Link
@kala shared a link, 3 months, 2 weeks ago
FAUN.dev()

20x Faster TRL Fine-tuning with RapidFire AI

RapidFire AI just dropped a scheduling engine built for chaos - and control. It shards datasets on the fly, reallocates as needed, and runs multipleTRL fine-tuning configs at once, even on a single GPU. No magic, just clever orchestration. It plugs into TRL withdrop-in wrappers, spreads training acr.. read more  

20x Faster TRL Fine-tuning with RapidFire AI
Link
@kala shared a link, 3 months, 2 weeks ago
FAUN.dev()

Code execution with MCP: building more efficient AI agents

Code is taking over MCP workflows - and fast. With theModel Context Protocol, agents don’t just call tools. They load them on demand. Filter data. Track state like any decent program would. That shift slashes context bloat - up to 98% fewer tokens. It also trims latency and scales cleaner across tho.. read more  

Code execution with MCP: building more efficient AI agents
Link
@kala shared a link, 3 months, 2 weeks ago
FAUN.dev()

Hacking Gemini: A Multi-Layered Approach

A researcher found a multi-layer sanitization gap inGoogle Gemini. It let attackers pull off indirect prompt injections to leak Workspace data - think Gmail, Drive, Calendar - using Markdown image renders across Gemini andColab export chains. The trick? Sneaking through cracks between HTML and Markd.. read more  

Link
@kala shared a link, 3 months, 2 weeks ago
FAUN.dev()

'I'm deeply uncomfortable': Anthropic CEO warns that a cadre of AI leaders, including himself, should not be in charge of the technology’s future

Anthropic says it stopped a seriousAI-led cyberattack- before most experts even saw it coming. No major human intervention needed. They didn't stop there. Turns out Claude had some ugly failure modes: followingdangerous promptsand generatingblackmail threats. Anthropic flagged, documented, patched, .. read more  

'I'm deeply uncomfortable': Anthropic CEO warns that a cadre of AI leaders, including himself, should not be in charge of the technology’s future
The Open Source Security Foundation (OpenSSF) is an industry-backed foundation focused on strengthening the security of the global open source software ecosystem. It brings together major technology companies, cloud providers, open source communities, and security experts to address systemic security challenges that affect how software is built, distributed, and consumed.

OpenSSF was launched in 2021 and operates under the Linux Foundation, combining efforts from earlier initiatives such as the Core Infrastructure Initiative (CII) and industry-led supply chain security programs. Its mission is to make open source software more trustworthy, resilient, and secure by default, without placing unrealistic burdens on maintainers.

The foundation works across several key areas:

- Supply chain security: Developing frameworks, best practices, and tools to secure the software lifecycle from source to deployment. This includes stewardship of projects like sigstore and leadership on SLSA (Supply-chain Levels for Software Artifacts).

- Security tooling: Supporting and incubating open source tools that help developers detect, prevent, and remediate vulnerabilities at scale.

- Vulnerability management: Improving how vulnerabilities are discovered, disclosed, scored, and fixed across open source projects.

- Education and best practices: Publishing guidance, training, and maturity models such as the OpenSSF Best Practices Badge Program, which helps projects assess and improve their security posture.

- Metrics and research: Advancing data-driven approaches to understanding open source security risks and ecosystem health.

OpenSSF operates through working groups and special interest groups (SIGs) that focus on specific problem areas like securing builds, improving dependency management, or automating provenance generation. This structure allows practitioners to collaborate on concrete, actionable solutions rather than high-level policy alone.

By aligning maintainers, enterprises, and security teams, OpenSSF plays a central role in reducing large-scale risks such as dependency confusion, compromised build systems, and malicious package injection. Its work underpins many modern DevSecOps and cloud-native security practices and is increasingly referenced by governments and enterprises as a baseline for secure software development.