PinnedPublished inCyberArk EngineeringEnabling workers to create a pull request on their first dayIn this post, You will learn how I’ve succeeded in creating a pull request — a general term that means contributing code to accompany code…Nov 8, 2022A response icon1Nov 8, 2022A response icon1
Published inCyberArk EngineeringA Security Testing System for LLMs that Anyone Can UseHow to test your AI\LLM application REST API endpoint with an easy-to-use security tool.Feb 16Feb 16
Published inCyberArk EngineeringWhen CSS-in-JS and CSP CollideWhen you choose your CSS-in-JS CSP policy, you should also think about your security policy.Aug 12, 2024Aug 12, 2024
The Pot-Bot: Using AI and IoT to Make Your Plants Talk Back!Do some magic with RaspberryPi, Sensors, LLM, Ollama, speaker and a little bit of code.May 22, 2024May 22, 2024
Published inCyberArk EngineeringCode security in LLM on the real worldUsing LLM for coding? Great! but you know that there might be security issues with that code. Right?Aug 21, 2023Aug 21, 2023
Published inCyberArk EngineeringHow to Add Context to OpenAI GPT with LlamaIndexAlex Gelman, Ran Bar-ZikJun 8, 2023A response icon1Jun 8, 2023A response icon1
Published inCyberArk EngineeringDisplay output for users in BASH configuration scriptsWhen you create environment configuration scripts for users, in some cases, you have to show significant output or call for action.Apr 20, 2023A response icon1Apr 20, 2023A response icon1
What a humble web developer can learn from Raspberry Pi.I love Raspberry Pi, and I love tweaking with it. Raspberry Pi looks like a very nice hobby, but unrelated to my professions as a web…Aug 1, 2022A response icon1Aug 1, 2022A response icon1
Published inSoluto by asurionWhy jest snapshots can be harmful — practical examplesWhat are jest snapshots?Jan 27, 2022A response icon2Jan 27, 2022A response icon2