Blog
✍️ Blog
This blog serves as my primary writing hub, where I document and reflect on my research and engineering work in security and trustworthy AI.
I mainly write about:
- AI & Software Supply Chain Security
- MCP Attacks, Tool Poisoning, and Defenses
- Secure Systems Design (Rust, Sandboxing, Telemetry)
Most posts are written as research notes, engineering deep dives, or companion articles to my papers and open-source projects.
📌 Featured Posts
- Practical Techniques for High-Performance Processing on Large-Scale Graphs
- Monitoring Docker Runtime Activity on Linux with Tracee: What the Documentation Doesn’t Tell You
- How to Solve Dependency Issues in Mythic’s C2 Profile Under a New Virtual Environment
- Exploiting Hidden Weakness in ML-Powered Web Apps: A Case Study
🔗 External Writing
Some articles are currently published on Medium for broader dissemination. Future long-form and research-oriented posts will be hosted directly on this site.
👉 Medium profile: https://newt-tan.medium.com/