Maidul

228 posts

Maidul banner
Maidul

Maidul

@maidulll

founder @infisical

127.0.0.1 Katılım Eylül 2021
65 Takip Edilen277 Takipçiler
Sabitlenmiş Tweet
Maidul
Maidul@maidulll·
being good at LeetCode is one of the worst indicator of a great builder. exceptional engineers should only be concerned with: - presenting past projects - talk in depth about tough engineering challenges they’ve helped solve - demonstrate critical thinking via practical system design interviews everything else is noise
Dmitrii Kovanikov@ChShersh

List of Data Structures to know to pass LeetCode interviews: 1. HashMap 2. Array 3. Single Linked List 4. Doubly Linked List 5. Stack 6. Queue 7. Binary Search Tree

English
49
37
653
90.2K
Maidul retweetledi
Infisical
Infisical@infisical·
Any secret an agent can read is a secret an attacker can steal. So we built the fix: Agent Vault, an HTTP credential proxy and vault for AI agents. Secret managers were built for deterministic services. They return credentials to the caller and trust them to behave. AI agents break that assumption. They are non-deterministic, prompt-injectable, and increasingly sitting in front of your prod APIs and databases. Instead of returning credentials directly to the agent, Agent Vault forces the agent to proxy requests through it, brokering credentials at the proxy layer and forwarding requests to any target API all in an interface-agnostic way. Credentials stay in the vault, encrypted with AES-256-GCM. The agent never touches them. What you get: → Brokered access through HTTPS_PROXY, not retrieval. Nothing to exfiltrate. → Firewall-like access rules implemented at the proxy. → Multi-vault RBAC to scope agents to a tight blast radius. → Full audit trail and inspection of every passing call. → All compacted in a single Go binary executable; available as a Docker container. Read out announcement post for a further breakdown: infisical.com/blog/agent-vau… Try it → github.com/Infisical/agen…
GIF
English
2
11
90
185.4K
Maidul retweetledi
Tony Dang
Tony Dang@dangtony98·
For a while, we've been grappling with one big question: How do we give agents secure access to services without them reading any secrets? Today, we provide an early answer: Agent Vault, an open source, HTTP credential proxy and vault. Agents like OpenClaw or Claude Code can proxy requests through Agent Vault regardless of the method an agent uses to interact with any target service: API, CLI, SDK, MCP. With Agent Vault, we’re rethinking how secrets should be consumed by agents. We believe that vaults and/or secret stores are here to stay but the way in which secrets are delivered to fit the ergonomics of how agents operate will change drastically. In the current state, agents cannot be trusted with holding secrets directly and so there has to be a dedicated credential broker beside each agent, be it through a dedicated service, sidecar, or egress layer; to securely attach credentials onto every request to the outside world. With this proxy in place, you can inspect proxied requests and, in the future, apply firewall rules to apply restrictions to traffic flowing through the proxy. The Agent Vault project by @infisical is an early peek into a trend that we believe many folks including Anthropic, Brex, Browser Use and others have caught onto which is the separation of the agent from its credentials. Check it out.
Tony Dang@dangtony98

x.com/i/article/2046…

English
14
18
152
42.2K
Maidul
Maidul@maidulll·
all secrets in Vercel not marked as sensitive need to be rotated immediately. if you're looking to quickly mark all secrets as sensitive going forward + setup auto rotations, try the @infisical Vercel integration to do it in one click
Vercel@vercel

We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems, impacting a limited subset of customers. Please see our security bulletin: vercel.com/kb/bulletin/ve…

English
1
9
24
3.5K
Maidul retweetledi
Vlad Matsiiako
Vlad Matsiiako@matsiiako·
If you’re a Vercel user acting on today’s security incident, here are some best next steps: > Rotate all secrets in your Vercel dashboard immediately > Bulk-migrate env vars to sensitive variables (@infisical has a Vercel sync you can use to quickly mark all secrets as sensitive) > Set up automations to rotate DB creds and API keys on a schedule > Use dynamic secrets, so DB credentials are short-lived > Pull secrets at runtime through our SDKs instead of storing them in Vercel > Make sure you have audit logs to see what was accessed
Vercel@vercel

We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems, impacting a limited subset of customers. Please see our security bulletin: vercel.com/kb/bulletin/ve…

English
25
76
722
206.5K
Maidul retweetledi
Han Wang
Han Wang@handotdev·
We just raised a $45M Series B at a $500M valuation led by @a16z and @SalesforceVC to build the knowledge infrastructure for AI
English
289
128
2.7K
597.7K
Maidul retweetledi
Infisical
Infisical@infisical·
How do you give Cursor, Claude Code, and Devin access to secrets without handing them the keys to production? @OpenRouter had to figure this out. 70+ model providers. New ones added every week. Each one bringing API keys that needed to reach specific services. For a while, custom scripts and manual updates held it together. Then their engineers started shipping with AI agents, and the old system couldn't answer a basic question: which credentials should an agent get, and which should it never touch? They built three access tiers with Infisical: → Dev secrets for engineers → Session-scoped credentials for AI agents → Locked-down access for production workloads Adding a new provider key went from a multi-service chore to a single update. 50+ engineering hours saved per month. Full story from OpenRouter's founding engineer: infisical.com/customers/open…
English
1
11
29
2.2K
Maidul retweetledi
Vlad Matsiiako
Vlad Matsiiako@matsiiako·
Infisical signups have grown 46% MoM (up from 25% last month)
English
2
7
45
3.5K
Maidul retweetledi
Infisical
Infisical@infisical·
Announcing Infisical for Kids, the enterprise-grade household secrets management platform: > Real-time secret interception > Privileged access management (per room) > Just-in-Time kitchen access via Slack > Automated permission slip lifecycle management With Infisical for Kids, your kid submits a formal access request for the pantry at 9 PM. Denied. Full audit trail included. Build infrastructure, not punishments. kids.infisical.com
Infisical tweet media
English
3
12
24
3.4K
Maidul retweetledi
Infisical
Infisical@infisical·
Rest in peace, .env. You served us well but you gotta go. Infisical fetches secrets at runtime so they never touch disk. CLI works with any language + SDKs and infra integrations. Docs below.
English
14
75
701
241K
Maidul
Maidul@maidulll·
the Minecraft modding community has a higher density of engineering talent than all of sf combined. there is no better way to become an exceptional engineer than falling in love with it through play. if your resume includes game mods, you are further ahead than you think
Eric Glyman@eglyman

One of our best engineers came from community college and the Minecraft modding community. Our best early salesperson came from a company with a -40 NPS ! How we hire at Ramp:

English
1
1
12
1K
Maidul retweetledi
Vlad Matsiiako
Vlad Matsiiako@matsiiako·
KubeCon 2026 is a vibe. Excited for the main show starting tomorrow!
Vlad Matsiiako tweet media
English
1
3
15
1.1K
Maidul retweetledi
Infisical
Infisical@infisical·
Secrets management, PKI/CLM, and privileged access -- how modern teams are actually handling identity + credentials across infrastructure 👇
English
2
4
11
844
Maidul retweetledi
Sam Altman
Sam Altman@sama·
I have so much gratitude to people who wrote extremely complex software character-by-character. It already feels difficult to remember how much effort it really took. Thank you for getting us to this point.
English
4.7K
2.2K
35.9K
5.7M