https://www.gravatar.com/avatar/a1a5f762bca516ff1fe40d39ac1e4f67?s=240&d=mp

Guanlan Dai

I Read Claude Code’s Leaked Source. It Exposes the Limits of Shell-First Safety.

Imagine this: a normal curl command is running in your terminal, sending runtime logs to a monitoring webhook. To a rule-based classifier, this looks routine. But what if the command was triggered by a hidden file in the codebase, one laced with a malicious prompt?

After Claude Code’s source leaked, I read through its security layer line by line. What I found was both impressive and clarifying: Claude Code is a very strong local security system, and it also shows exactly where that model starts to break. Once agents begin acting with real identities and causing real side effects, the problem is no longer just shell safety.

In the Age of Agentic, the CPU is the New Bottleneck

For the last three years, the center of gravity in AI felt obvious. Bigger models. More GPUs. Faster inference. Almost every serious conversation in the industry eventually collapsed back to the same axis.

Walking into SAP Center, I expected Jensen Huang to keep pushing the familiar story: more tokens, more throughput, more chips. Instead, he put Vera Rubin at the center of the stage.

Jensen Huang presenting Vera Rubin at SAP Center

What stood out was the framing. The pitch was no longer that AI simply needs more compute. It was that once AI starts behaving like agents, the hard part is no longer the model alone. It is the system around the model: the runtime, the orchestration layer, the tool chain, the data movement, and the handoff between components.

Agent Infrastructure Needs New Primitives

I’ve been thinking about agent infrastructure for a while, and one thing keeps coming back: the biggest shift is not what agents can do, but how they run.

That sounds subtle, but I think it matters a lot. The bottleneck is starting to move from model capability to execution. And most of the stack we use today was not built for that.

I had a long conversation with Mitchell Hashimoto recently that helped sharpen this for me. We came at it from different directions, but kept circling back to the same conclusions. A lot of this clicked into place in that discussion, and I’m grateful he let me share some of it here.

From a Napkin Offer to a Global Engineering Team: My 8-Year Journey Building Kong

How a café chat and a Napkin offer in San Francisco turned into an eight-year adventure building world-class infrastructure.

The Beginning

I never thought I would stay at one company for eight years.

What I remember most clearly is a café in San Francisco. Marco Palladino had just closed a round and wanted to talk about where Kong could go next. The pitch was simple and ambitious: let’s build the best API platform in the world.

Deep Dive into Kong Gateway's New Rust-Based Router

What is the Expressions Router?

The router component in the Kong Gateway is a crucial element for traffic handling, allowing the definition of specific matching rules to identify and process client requests. As a core component of the gateway, the router plays a vital role in ensuring the functionality, flexibility, security as well as performance of the gateway.

/img/668eda3d-image7-2.png

In the 3.0 version update of the Kong API Gateway, the routing system was completely rewritten in Rust — a memory-safe and efficient language. A concise DSL (Domain Specific Language) was designed to define routing rules efficiently, called the “Expressions Router.” The new design reduced the routing construction time by 75% when handling up to 10,000 routing rules, significantly decreasing from 20 seconds to 5 seconds.

Protecting Services With Kong Gateway Rate Limiting

The Kong Gateway Rate Limiting plugin  is one of our most popular traffic control add-ons. You can configure the plugin with a policy for what constitutes “similar requests” (requests coming from the same IP address, for example), and you can set your limits (limit to 10 requests per minute, for example). This tutorial will walk through how simple it is to enable rate limiting in your Kong Gateway .

Rate Limiting: Protecting Your Server 101

Let’s take a step back and go over the concept of rate limiting for those who aren’t familiar.