Loading…

Issue 323: Where have all the coders gone?

There’s a new sheriff in the wild west of AI…actually, it’s the same sheriff, just for agentic workflows. Authentication, security, and privacy are wearing a shiny new badge in this here wild, wild west, and they’re saying that this town ain’t big enough for AI bugs and security threats.

On the pod, 1Password’s Nancy Wang chatted about bringing robust credential governance to the AI agent ring, and the implications of giving your bot the password you use for all your accounts. Gee Rittenhouse from AWS Security sat down with us to explore multi-stage attacks and how AI is both helping and hurting cybersecurity efforts. And as you know, good security starts with good code, which is why we’ve got a blog on actually good coding guidelines for AI (and people too).

Beyond the blog, the internet is hopping on its horse and heading out onto that dusty road. While one outlaw dev is modding a callbox so it works on Apple Home, another deputy is trying to round up all the AI apps just to find out…there aren’t many. Now, we won’t let you be a lone rider high-tailing it out of this Overflow—take a few Q&As with you to keep you company on the vast plains of the internet. How mean was it to say “pluck you” in the 1800s? Are y’all saying the “r” in February, or are we in the wrong? What do you reckon was the big deal with that Intel CPU bug in the 90s? Well, we’re your huckleberry, because we’ve got all those links and more ready for you…just mosey down south.

From the blog

Prevent agentic identity theft

Ryan is joined by Nancy Wang, CTO of 1Password, to discuss the security challenges local agents present, how enterprises can create robust governance of credentials through zero-knowledge architecture, and the implications of agent intent and misuse in a world where AI agents are becoming more and more integrated into everyday applications.

Building shared coding guidelines for AI (and people too)

Coding guidelines and standards for agents need to be a little different—more explicit, demonstrative of patterns, and obvious.

Multi-stage attacks are the Final Fantasy bosses of security

Ryan welcomes Gee Rittenhouse, VP of Security at AWS, to the show to discuss the complexities of multi-stage attacks in cybersecurity and how these attacks unfold, the challenges in detecting them, and the evolving role of AI in both enhancing security and creating new vulnerabilities.

Interesting questions

Intel CPU bug in the 90s

Like all things in the 90s, the tabloids made it a bigger deal than it really was.

Is the first "r" in "February" now considered a silent letter?

Actually, we’ve all just been saying it wrong.

Links from around the web

The cognitive dark forest

“The sheer act of thinking outside the box makes the box bigger.”

The jellies that evolved a different way to keep time

A new meaning for “Peanut Butter, Jelly Time.”

So where are all the AI apps?

Where is my Sam Altman? Where is my Claude song? Where is my agentic ending? Where have all the AI apps gone?

Box of secrets

The difference between modding and hacking really comes down to how helpful the end result is.


Onboard, organize, and bring your team up to speed in a jiffy. Try Stack Internal.