image mode Gave Me the Confidence to Go Fully Agentic

image mode Gave Me the Confidence to Go Fully Agentic
image mode Gave Me the Confidence to Go Fully Agentic - thumbnail showing broken packages vs container registry

I’ve been running Claude Code on my RHEL 10 workstation for a few months now, and I have to admit, with some embarrassment, I often run it with the ominous –dangerously-skip-permissions option. It reads and writes files, executes shell commands, installs packages, modifies system configs, all without asking permission first. I’ve been letting an AI

MCP-Airlock: An Open Source Defense Against Prompt Injection in AI Agents

MCP-Airlock: An Open Source Defense Against Prompt Injection in AI Agents
MCP-Airlock: An Open Source Defense Against Prompt Injection in AI Agents

The Problem Coding assistants like Claude, Cursor, Goose and autonomous agents like OpenClaw fetch web all day everyday, and it’s basically playing Russian roulette with prompt injection. I had a false sense of confidence with Claude because I sit in front of it, and sort of monitor what it’s doing… But, when I set up

CI/CD for Your RHEL 10 Bootc Workstation: A Practical Guide to GitHub Actions, Podman, and Quay.io

CI/CD for Your RHEL 10 Bootc Workstation: A Practical Guide to GitHub Actions, Podman, and Quay.io
CI/CD for Image Mode RHEL - Lock and Ship concept with padlocked container crate

A practical walkthrough of setting up CI/CD for a RHEL 10 bootc workstation image using GitHub Actions, Podman, and Quay.io — including the workarounds you’ll actually need.

Local Models and Open Source Agents (and Why You Need to Pay Attention)

Local Models and Open Source Agents (and Why You Need to Pay Attention)

There’s a lot of negativity toward AI in the Fedora and RHEL communities right now. I get it — the hype cycle is real, and a lot of the marketing is insufferable. But I think the negativity is causing people to tune out, and when you tune out, you miss genuinely cool work that’s directly

The State of Enterprise Linux in 2023

The State of Enterprise Linux in 2023

Introduction Are you a professional Linux Systems Administrator, Architect, or Site Reliability Engineer? Do you use Fedora, Red Hat Enterprise Linux (RHEL) or a derivative in the course of your work? Do you find it difficult to keep up with all of the changes that have been going on with RHEL in the last few

Snyk Webinar 2021: Virtual: Hack My Mis-Configured Kubernetes

Snyk Webinar 2021: Virtual: Hack My Mis-Configured Kubernetes

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Security Symposium 2020: Virtual: Live Panel: Containers and Kubernetes Security

Security Symposium 2020: Virtual: Live Panel: Containers and Kubernetes Security

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Security Symposium 2020: Virtual: The Security Implications of Running Software in Containers

Security Symposium 2020: Virtual: The Security Implications of Running Software in Containers

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

A Concise Introduction to DevSecOps

Why Should I Care About DevSecOps? Are you a frustrated security professional, trying to get your organization to change (aren’t we all)? Or perhaps, you are trying to get management to value security more? Or maybe, you are a security conscious Developer (wait, do those actually exist? Yes, yes, they do) or Sysadmin who knows

What is sVirt and How Does it Isolate Linux Containers?

What is sVirt and How Does it Isolate Linux Containers?

Background What is sVirt and, why does it matter for your containers? The short answer is, because sVirt is another layer of security and defense in depth is a good approach to security. The longer answer is, sVirt dynamically generates an SELinux label for every single one of your containers, which makes them less likely