<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Claire Speedy</title>
    <description>The latest articles on DEV Community by Claire Speedy (@claire_speedy).</description>
    <link>https://dev.to/claire_speedy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3779551%2F1e0a852e-a5d5-4a7d-b4b7-5fb1a8877ffc.png</url>
      <title>DEV Community: Claire Speedy</title>
      <link>https://dev.to/claire_speedy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/claire_speedy"/>
    <language>en</language>
    <item>
      <title>Hack the AI Stack: Cloudsmith x Chainguard Hackathon</title>
      <dc:creator>Claire Speedy</dc:creator>
      <pubDate>Wed, 18 Feb 2026 13:42:39 +0000</pubDate>
      <link>https://dev.to/claire_speedy/hack-the-ai-stack-cloudsmith-x-chainguard-hackathon-5006</link>
      <guid>https://dev.to/claire_speedy/hack-the-ai-stack-cloudsmith-x-chainguard-hackathon-5006</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;a href="https://cloudsmith.com/events/workshops/hack-the-ai-stack-cloudsmith-and-chainguard-hackathon?&amp;amp;utm_source=dev.to&amp;amp;utm_medium=referral&amp;amp;utm_campaign=305770711-Artifact%20Security%20in%20the%20Age%20of%20AI%20%5B2026%5D&amp;amp;utm_content="&gt;Hack the AI Stack: Securing Real AI Workloads on Kubernetes&lt;/a&gt;&lt;/strong&gt; 🔐🤖&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tuesday, 24 February, 2026 at 4pm GMT / 11am EST | 1 HOUR | ONLINE&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AI is officially part of the production stack — and that changes everything.&lt;/p&gt;

&lt;p&gt;Modern teams are shipping LLM-powered workloads fast, but the supply chains behind those systems are messy, opaque, and easy to exploit. Models, containers, dependencies… they all introduce new attack paths that most pipelines weren’t designed to handle.&lt;/p&gt;

&lt;p&gt;That’s why &lt;strong&gt;Cloudsmith and Chainguard&lt;/strong&gt; are teaming up for a hands-on, virtual hackathon where you’ll &lt;strong&gt;build, break, and secure a real AI workload running on Kubernetes&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What you’ll actually do&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This isn’t a slide deck. You’ll get your hands dirty:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deploy and attack &lt;strong&gt;real AI workloads in Kubernetes&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Work with LLM tooling like &lt;strong&gt;Ollama&lt;/strong&gt; and &lt;strong&gt;Hugging Face&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;See how AI supply chains break in practice, not theory&lt;/li&gt;
&lt;li&gt;Secure models, containers, and dependencies before they reach production&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You’ll use &lt;strong&gt;&lt;a href="https://cloudsmith.com/" rel="noopener noreferrer"&gt;Cloudsmith&lt;/a&gt;&lt;/strong&gt; to ingest, verify, quarantine, and promote AI artifacts across environments, while &lt;strong&gt;Chainguard’s hardened images and &lt;a href="https://www.chainguard.dev/libraries" rel="noopener noreferrer"&gt;libraries&lt;/a&gt;&lt;/strong&gt; eliminate entire classes of risk before workloads ever hit runtime.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who should join?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’re:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Building or operating AI/LLM workloads&lt;/li&gt;
&lt;li&gt;Running Kubernetes in production&lt;/li&gt;
&lt;li&gt;Thinking about supply chain security, provenance, and trust&lt;/li&gt;
&lt;li&gt;Curious how attackers actually target AI systems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;…this one’s for you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why this matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AI systems are non-deterministic, fast-moving, and increasingly automated. Traditional security controls don’t cut it anymore. This hackathon shows how modern teams embed trust, verification, and security from source to production — without slowing developers down.&lt;/p&gt;

&lt;p&gt;Bring your laptop. Expect to break things. Leave knowing how to ship AI workloads with confidence.&lt;/p&gt;

&lt;p&gt;👉 Spots are limited — &lt;a href="https://cloudsmith.com/events/workshops/hack-the-ai-stack-cloudsmith-and-chainguard-hackathon?&amp;amp;utm_source=dev.to&amp;amp;utm_medium=referral&amp;amp;utm_campaign=305770711-Artifact%20Security%20in%20the%20Age%20of%20AI%20%5B2026%5D&amp;amp;utm_content="&gt;sign up&lt;/a&gt; and hack the AI stack with us.&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>devops</category>
      <category>hackathon</category>
      <category>containers</category>
    </item>
  </channel>
</rss>
