Forem

Ugo Enyioha profile picture

Ugo Enyioha

Many years in information security implementing defensive solutions....

Joined Joined on 
37 Vulnerabilities Exposed Across 15 AI IDEs: The Threat Model Every AI Coding Tool User Must Understand

37 Vulnerabilities Exposed Across 15 AI IDEs: The Threat Model Every AI Coding Tool User Must Understand

Comments
7 min read

Want to connect with Ugo Enyioha?

Create an account to connect with Ugo Enyioha. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Writing CLI Tools That AI Agents Actually Want to Use

Writing CLI Tools That AI Agents Actually Want to Use

3
Comments
8 min read
The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

The Agentic Software Factory: How AI Teams Debate, Code, and can Secure Enterprise Infrastructure

3
Comments 1
13 min read
Prompting Techniques That Actually Work: Lessons from Automating Architecture Analysis

Prompting Techniques That Actually Work: Lessons from Automating Architecture Analysis

2
Comments 4
24 min read
Building Agent Teams in OpenCode: Architecture of Multi-Agent Coordination

Building Agent Teams in OpenCode: Architecture of Multi-Agent Coordination

11
Comments 1
8 min read
Securing Agentic Systems with Authenticated Delegation - Part II

Securing Agentic Systems with Authenticated Delegation - Part II

Comments
12 min read
Securing Agentic Systems with Authenticated Delegation - Part I

Securing Agentic Systems with Authenticated Delegation - Part I

Comments
16 min read
loading...