<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mounir  Elsrogy</title>
    <description>The latest articles on DEV Community by Mounir  Elsrogy (@m9nx).</description>
    <link>https://dev.to/m9nx</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3696398%2Fcdf3c071-bc93-4e66-84d2-2e67fa0ef896.jpg</url>
      <title>DEV Community: Mounir  Elsrogy</title>
      <link>https://dev.to/m9nx</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/m9nx"/>
    <language>en</language>
    <item>
      <title>CodexA: Open-Source AI Code Intelligence Engine for Developers</title>
      <dc:creator>Mounir  Elsrogy</dc:creator>
      <pubDate>Mon, 09 Mar 2026 19:42:49 +0000</pubDate>
      <link>https://dev.to/m9nx/codexa-open-source-ai-code-intelligence-engine-for-developers-1mlh</link>
      <guid>https://dev.to/m9nx/codexa-open-source-ai-code-intelligence-engine-for-developers-1mlh</guid>
      <description>&lt;p&gt;What is CodexA?&lt;br&gt;
CodexA is a blazing-fast, open-source code intelligence engine for developers. It brings AI-powered search, symbol explanation, dependency analysis, and more—directly to your local machine, CLI, or editor.&lt;/p&gt;

&lt;p&gt;Local-first: All code analysis runs on your machine. No cloud lock-in, no privacy risk.&lt;br&gt;
Rich CLI &amp;amp; API: 30+ CLI commands, REST API, and a web UI.&lt;br&gt;
AI Agent Protocol: Integrates with GitHub Copilot, LLMs, and custom agents for deep code understanding.&lt;br&gt;
Multi-language: Supports Python, JavaScript, TypeScript, and more via Tree-sitter parsing.&lt;br&gt;
Architecture Overview&lt;br&gt;
CodexA is built for extensibility and speed:&lt;/p&gt;

&lt;p&gt;Core Engine: Handles code indexing, semantic search (FAISS), and embeddings (sentence-transformers).&lt;br&gt;
CLI &amp;amp; Tools: 30+ commands for search, symbol explanation, call graphs, impact analysis, and more.&lt;br&gt;
Plugin System: 20+ hooks for custom tools, LLM providers, or new languages.&lt;br&gt;
Web UI &amp;amp; REST API: Modern VitePress docs, interactive dashboard, and REST endpoints.&lt;br&gt;
Self-Evolving: Built-in evolution engine for self-improving code and docs.&lt;br&gt;
For a deep dive, see the architecture reference.&lt;/p&gt;

&lt;p&gt;Why Use CodexA?&lt;br&gt;
OSS maintainers: Instantly answer “where is this used?” or “what breaks if I change this?” across huge codebases.&lt;br&gt;
Plugin authors: Build custom AI tools, integrate new LLMs, or add language support with minimal friction.&lt;br&gt;
Teams: Run secure, local code search and analysis—no data leaves your machine.&lt;br&gt;
Key Features&lt;br&gt;
Semantic code search (natural language or symbol-based)&lt;br&gt;
Symbol explanation, call graphs, and dependency trees&lt;br&gt;
Impact analysis (“blast radius” for code changes)&lt;br&gt;
Quality metrics, hotspots, and code review helpers&lt;br&gt;
VitePress-powered docs and contributor guides&lt;br&gt;
GitHub Actions workflow for auto-deploying docs (with custom domain support)&lt;br&gt;
Get Started&lt;br&gt;
GitHub: M9nx/CodexA&lt;br&gt;
Docs: codex-a.dev&lt;br&gt;
Install: pip install codexa (Python 3.8+)&lt;br&gt;
Try: codex search "find all database queries" in your repo&lt;br&gt;
Feedback &amp;amp; Contributions&lt;br&gt;
Star the repo, open issues, or join the discussion on GitHub. Contributors wanted—especially for new language plugins and LLM integrations.&lt;/p&gt;

</description>
      <category>mcp</category>
      <category>llm</category>
      <category>githubcopilot</category>
      <category>ai</category>
    </item>
    <item>
      <title>Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)</title>
      <dc:creator>Mounir  Elsrogy</dc:creator>
      <pubDate>Tue, 06 Jan 2026 13:18:49 +0000</pubDate>
      <link>https://dev.to/m9nx/exploring-runtime-request-inspection-in-laravel-guards-contexts-and-tradeoffs-4pg9</link>
      <guid>https://dev.to/m9nx/exploring-runtime-request-inspection-in-laravel-guards-contexts-and-tradeoffs-4pg9</guid>
      <description>&lt;h1&gt;
  
  
  Exploring runtime request inspection in Laravel
&lt;/h1&gt;

&lt;p&gt;I’ve been experimenting with a Laravel package that inspects requests &lt;strong&gt;during runtime&lt;/strong&gt;, not just before the controller is hit.&lt;/p&gt;

&lt;p&gt;This started as a question rather than a solution:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can runtime context inside the framework give better security signals than static request inspection?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So I decided to prototype it.&lt;/p&gt;




&lt;h2&gt;
  
  
  Core idea
&lt;/h2&gt;

&lt;p&gt;Instead of relying only on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;validation rules&lt;/li&gt;
&lt;li&gt;middleware checks&lt;/li&gt;
&lt;li&gt;edge security (WAF, CDN rules)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The package builds a &lt;strong&gt;RuntimeContext&lt;/strong&gt; once the request is already inside Laravel and runs a pipeline of &lt;strong&gt;Guards&lt;/strong&gt; against it.&lt;/p&gt;

&lt;p&gt;Each guard inspects a different aspect of the request or behavior.&lt;/p&gt;




&lt;h2&gt;
  
  
  Architecture (high level)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;RuntimeContext&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Normalized request data&lt;/li&gt;
&lt;li&gt;Headers, body, route info&lt;/li&gt;
&lt;li&gt;Execution metadata&lt;/li&gt;
&lt;li&gt;Optional historical signals&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Guards&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Small, focused inspectors&lt;/li&gt;
&lt;li&gt;Priority-based execution&lt;/li&gt;
&lt;li&gt;Can short-circuit or aggregate results&lt;/li&gt;
&lt;li&gt;Return structured GuardResult objects&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Profiles&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Group guards per route or use-case&lt;/li&gt;
&lt;li&gt;Different behavior for APIs vs admin routes&lt;/li&gt;
&lt;li&gt;Different enforcement modes&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Response modes&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;log only&lt;/li&gt;
&lt;li&gt;silent&lt;/li&gt;
&lt;li&gt;block&lt;/li&gt;
&lt;li&gt;dry-run (full inspection, no enforcement)&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h2&gt;
  
  
  Guards implemented so far
&lt;/h2&gt;

&lt;p&gt;Examples (not claiming completeness):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SQL injection (pattern-based + heuristics)&lt;/li&gt;
&lt;li&gt;XSS indicators&lt;/li&gt;
&lt;li&gt;SSRF attempts (internal IPs, metadata endpoints)&lt;/li&gt;
&lt;li&gt;Mass assignment abuse&lt;/li&gt;
&lt;li&gt;PHP deserialization vectors&lt;/li&gt;
&lt;li&gt;NoSQL operator injection&lt;/li&gt;
&lt;li&gt;GraphQL depth / complexity abuse&lt;/li&gt;
&lt;li&gt;Bot &amp;amp; anomaly behavior (experimental)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each guard:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;is configurable&lt;/li&gt;
&lt;li&gt;can be enabled/disabled at runtime&lt;/li&gt;
&lt;li&gt;has a defined cost / priority&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Performance considerations
&lt;/h2&gt;

&lt;p&gt;This was a big concern, so I added some experiments:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deduplication cache for repeated payloads&lt;/li&gt;
&lt;li&gt;Sampling (inspect % of requests, always inspect suspicious ones)&lt;/li&gt;
&lt;li&gt;Tiered inspection (fast scan → deep scan)&lt;/li&gt;
&lt;li&gt;Guard-level and pipeline time budgets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Still very much unproven in real production traffic.&lt;/p&gt;




&lt;h2&gt;
  
  
  What this is NOT
&lt;/h2&gt;

&lt;p&gt;Just to be clear:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Not a replacement for validation&lt;/li&gt;
&lt;li&gt;Not a WAF&lt;/li&gt;
&lt;li&gt;Not claiming to “block all attacks”&lt;/li&gt;
&lt;li&gt;Not production-ready yet&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is more of a &lt;strong&gt;design experiment&lt;/strong&gt; around:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;guard composition&lt;/li&gt;
&lt;li&gt;runtime context modeling&lt;/li&gt;
&lt;li&gt;tradeoffs between signal quality and overhead&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Why I’m sharing this
&lt;/h2&gt;

&lt;p&gt;I’m mainly looking for feedback on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;architecture choices&lt;/li&gt;
&lt;li&gt;guard interface design&lt;/li&gt;
&lt;li&gt;things that are fundamentally flawed&lt;/li&gt;
&lt;li&gt;existing projects that already solved this better&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’ve worked with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Laravel internals&lt;/li&gt;
&lt;li&gt;PHP security tooling&lt;/li&gt;
&lt;li&gt;request lifecycles&lt;/li&gt;
&lt;li&gt;or runtime analysis systems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I’d love to hear your thoughts — positive or negative.&lt;/p&gt;




&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;p&gt;GitHub (source &amp;amp; issues):&lt;br&gt;
&lt;a href="https://github.com/M9nx/laravel-runtime-guard" rel="noopener noreferrer"&gt;https://github.com/M9nx/laravel-runtime-guard&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Packagist:&lt;br&gt;
&lt;a href="https://packagist.org/packages/m9nx/laravel-runtime-guard" rel="noopener noreferrer"&gt;https://packagist.org/packages/m9nx/laravel-runtime-guard&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;If this turns out to be a dead end, that’s fine — I mainly want to understand &lt;em&gt;why&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Any feedback is appreciated 🙏&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>laravel</category>
      <category>security</category>
    </item>
  </channel>
</rss>
