<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Alay Sharma</title>
    <description>The latest articles on DEV Community by Alay Sharma (@mrvenom17).</description>
    <link>https://dev.to/mrvenom17</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3357846%2F4e65e90e-9aac-4221-9fe1-144fcd6ee80c.png</url>
      <title>DEV Community: Alay Sharma</title>
      <link>https://dev.to/mrvenom17</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mrvenom17"/>
    <language>en</language>
    <item>
      <title>I shipped a hospital management system to production. Here's what actually broke.</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Thu, 07 May 2026 15:43:32 +0000</pubDate>
      <link>https://dev.to/mrvenom17/i-shipped-a-hospital-management-system-to-productionheres-what-actually-broke-2aem</link>
      <guid>https://dev.to/mrvenom17/i-shipped-a-hospital-management-system-to-productionheres-what-actually-broke-2aem</guid>
      <description>&lt;p&gt;Everyone ships demos. Localhost is kind — it has no users, no retries, no race conditions, no 3am failures. Production is where your assumptions get stress-tested by reality.&lt;/p&gt;

&lt;p&gt;I built and deployed a full hospital management system: FastAPI backend, React web frontend, Flutter mobile app, Supabase PostgreSQL, Razorpay payments, Redis queues, and WhatsApp notifications via Selenium. Here's the post-mortem on what actually broke and how I fixed it.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Razorpay webhook idempotency — naive payment handling double-charges users
&lt;/h2&gt;

&lt;p&gt;Razorpay retries failed webhooks. So does every serious payment processor. If your handler isn't idempotent, a network blip between their retry and your database write means you process the same event twice. The user gets charged once. Your DB thinks they paid twice. Chaos.&lt;/p&gt;

&lt;p&gt;The fix isn't clever code — it's a database constraint.&lt;/p&gt;

&lt;p&gt;I added a &lt;code&gt;deduplication_key&lt;/code&gt; column on the &lt;code&gt;payment_webhooks&lt;/code&gt; table with a unique index. Every webhook payload carries a Razorpay event ID. On arrival: insert it, process it, or fail silently if the key already exists. No conditionals, no &lt;code&gt;if already_processed&lt;/code&gt;. The database enforces it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight sql"&gt;&lt;code&gt;&lt;span class="k"&gt;CREATE&lt;/span&gt; &lt;span class="k"&gt;UNIQUE&lt;/span&gt; &lt;span class="k"&gt;INDEX&lt;/span&gt; &lt;span class="n"&gt;idx_payment_webhooks_dedup&lt;/span&gt; 
&lt;span class="k"&gt;ON&lt;/span&gt; &lt;span class="n"&gt;payment_webhooks&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;deduplication_key&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Payment logic should be a pure function of an event ID. If you've seen it before, return &lt;code&gt;200&lt;/code&gt; and do nothing. That's it. Any other approach is a liability waiting to surface at the worst possible time.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. WhatsApp automation via Selenium — why the official API isn't always the answer
&lt;/h2&gt;

&lt;p&gt;The Meta Business API requires a verified business, a WABA account, approved message templates, and per-message fees. For a hospital running 40 bookings a day in India, the economics don't work. So I automated WhatsApp Web via Selenium.&lt;/p&gt;

&lt;p&gt;Here's what breaks in production: QR code expiry, DOM changes after WhatsApp Web updates, headless Chrome memory leaks, and silent rate limiting from Meta's side if you push volume.&lt;/p&gt;

&lt;p&gt;I fixed it with three things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Session persistence&lt;/strong&gt; — Selenium reuses a Chrome user profile that stays logged in. No re-scanning QR codes on every restart.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dead-man's switch&lt;/strong&gt; — a watchdog process that kills and restarts the driver if a successful send hasn't been confirmed in 10 minutes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit trail&lt;/strong&gt; — every outbound message is written to a &lt;code&gt;whatsapp_logs&lt;/code&gt; table with status (&lt;code&gt;sent&lt;/code&gt;, &lt;code&gt;failed&lt;/code&gt;, &lt;code&gt;retrying&lt;/code&gt;). Hospitals are accountable institutions. You need the record.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Selenium approach is fragile by nature. You accept that fragility and build resilience around it — you don't pretend it's stable infrastructure.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. Redis async task queue — why synchronous notification dispatch blocks everything
&lt;/h2&gt;

&lt;p&gt;First version of the booking flow: confirmation saved → Selenium sends WhatsApp → API returns response. Selenium takes 3–8 seconds to open a conversation thread and send a message. Your API is blocking that entire time. Under any load, requests pile up, timeouts compound, and a booking endpoint that should return in 200ms becomes a 9-second operation.&lt;/p&gt;

&lt;p&gt;Decoupling is the only fix.&lt;/p&gt;

&lt;p&gt;The booking endpoint now does one thing: write a job to a Redis queue, then return &lt;code&gt;200&lt;/code&gt;. A separate background worker consumes the queue, handles Selenium, retries on failure, updates &lt;code&gt;whatsapp_logs&lt;/code&gt;. The API doesn't care about notification state.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Endpoint — fast, non-blocking
&lt;/span&gt;&lt;span class="n"&gt;redis_client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;lpush&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;notification_queue&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;json&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;dumps&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;job_payload&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
&lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;status&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;confirmed&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;# Worker — slow, isolated, retryable
&lt;/span&gt;&lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="bp"&gt;True&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="n"&gt;job&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;redis_client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;brpop&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;notification_queue&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;dispatch_whatsapp&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;job&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Response time went from 5–9 seconds to under 300ms. The booking logic was always fast. I was just carrying unnecessary weight in the hot path.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Multi-role JWT + Supabase RLS — the mistake most tutorials make
&lt;/h2&gt;

&lt;p&gt;The common tutorial pattern: encode the user's role in the JWT payload, check it in your route handler, gate the endpoint. Looks fine. It's not.&lt;/p&gt;

&lt;p&gt;A stale token carries stale permissions. A doctor whose account was suspended can still read patient data until their token expires. In a healthcare system, that's not acceptable.&lt;/p&gt;

&lt;p&gt;I encode only a &lt;code&gt;user_id&lt;/code&gt; in the JWT. On every request, FastAPI fetches the current role from the database — live, not cached in the token. Supabase Row Level Security then enforces data access at the storage layer, independent of the application layer.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Dependency — resolves role fresh on every request
&lt;/span&gt;&lt;span class="k"&gt;async&lt;/span&gt; &lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;get_current_user&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;token&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;str&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;Depends&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;oauth2_scheme&lt;/span&gt;&lt;span class="p"&gt;)):&lt;/span&gt;
    &lt;span class="n"&gt;user_id&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;decode_jwt&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;token&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="n"&gt;db&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;fetch_one&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;SELECT * FROM users WHERE id = $1&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;user_id&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Three independent enforcement layers: JWT for identity, DB lookup for current role, RLS for data access. Any one of them catches what the others miss. That's defense in depth — not just a phrase, an actual architectural decision.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Flutter + React + FastAPI — keeping two frontends honest against one database
&lt;/h2&gt;

&lt;p&gt;The failure mode looks subtle at first. Mobile app caches an appointment as confirmed. Web dashboard still shows it as pending. A doctor sees one state. The patient sees another. Support calls happen. Trust erodes.&lt;/p&gt;

&lt;p&gt;Two frontends reading the same data isn't inherently a distributed systems problem — until you let each client own its own state. Then it is.&lt;/p&gt;

&lt;p&gt;Supabase is the single source of truth. Not an API response, not local state in either client. Both Flutter and React read from the same PostgreSQL database through the same FastAPI layer. Neither client writes directly to Supabase outside of realtime subscriptions for live updates.&lt;/p&gt;

&lt;p&gt;The rule I enforced: &lt;strong&gt;every mutation goes through the API&lt;/strong&gt;. No client-side optimistic writes that don't have a confirmed server echo. No divergent data-fetching logic between platforms. One schema, one API contract, two consumers.&lt;/p&gt;

&lt;p&gt;When you have two frontends, consistency isn't a feature you add later. It's a constraint you build into your data layer from the start.&lt;/p&gt;




&lt;h2&gt;
  
  
  The honest lesson
&lt;/h2&gt;

&lt;p&gt;Production doesn't care about your architecture diagrams.&lt;/p&gt;

&lt;p&gt;It cares whether your payment handler is idempotent at 2am when Razorpay fires a retry. It cares whether your notification worker recovers without a manual restart. It cares whether a role change propagates before the next API call hits your route guard.&lt;/p&gt;

&lt;p&gt;Demos prove that something &lt;em&gt;can&lt;/em&gt; work. Production proves that it &lt;em&gt;does&lt;/em&gt; — repeatedly, under pressure, without you watching. That's a completely different engineering problem, and most systems only find out the difference after they've already failed.&lt;/p&gt;

</description>
      <category>python</category>
      <category>webdev</category>
      <category>devops</category>
      <category>fastapi</category>
    </item>
    <item>
      <title>Beyond "Vibe Coding": Architecting a Zero-Copy Hybrid C++/Python HFT System</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Sun, 29 Mar 2026 10:45:01 +0000</pubDate>
      <link>https://dev.to/mrvenom17/beyond-vibe-coding-architecting-a-zero-copy-hybrid-cpython-hft-system-ec0</link>
      <guid>https://dev.to/mrvenom17/beyond-vibe-coding-architecting-a-zero-copy-hybrid-cpython-hft-system-ec0</guid>
      <description>&lt;p&gt;Everyone is drunk on “vibe coding”—prompt a model, get thousands of lines, feel like you shipped something real. That illusion collapses the moment you enter a domain where &lt;strong&gt;latency is a P&amp;amp;L variable&lt;/strong&gt;. In HFT, a single unpredictable pause isn’t a bug—it’s lost edge.&lt;/p&gt;

&lt;p&gt;I didn’t “use AI to build a trading system.” I used it as a compiler for syntax while taking full ownership of architecture, memory, and failure modes. That distinction is everything.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Real Problem: Latency vs. Intelligence
&lt;/h2&gt;

&lt;p&gt;You’re forced into a false trade-off:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;C++&lt;/strong&gt; → deterministic, nanosecond execution, zero tolerance for abstraction overhead&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Python&lt;/strong&gt; → flexible, ML-native, but plagued by GIL, GC pauses, and jitter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you pick one, you lose.&lt;/p&gt;

&lt;p&gt;So don’t pick.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Only Viable Model: Separation of Concerns at the Process Level
&lt;/h2&gt;

&lt;p&gt;Not microservices. Not APIs. Not containers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hard separation of responsibilities at the memory boundary.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  1. The Hot Path (C++ — Nervous System)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Owns the NIC&lt;/li&gt;
&lt;li&gt;Ingests raw UDP/WebSocket ticks&lt;/li&gt;
&lt;li&gt;Normalizes into a strict binary schema&lt;/li&gt;
&lt;li&gt;Writes to memory with deterministic timing&lt;/li&gt;
&lt;li&gt;No branching logic, no ML, no allocation-heavy operations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This process is sacred. You don’t “optimize” it later. You design it to be untouchable from day one.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. The Smart Path (Python — Brain)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Reads normalized data&lt;/li&gt;
&lt;li&gt;Computes features (EWMA, efficiency ratios, etc.)&lt;/li&gt;
&lt;li&gt;Runs model inference (PyTorch)&lt;/li&gt;
&lt;li&gt;Emits execution signals&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s allowed to be complex. It’s not allowed to touch latency-critical infrastructure.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Critical Insight: IPC Is the Hidden Bottleneck
&lt;/h2&gt;

&lt;p&gt;Most people destroy their system here.&lt;/p&gt;

&lt;p&gt;Sockets, Redis, gRPC—these are all &lt;strong&gt;latency leaks disguised as architecture&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Serialization cost&lt;/li&gt;
&lt;li&gt;Kernel traversal&lt;/li&gt;
&lt;li&gt;Context switching&lt;/li&gt;
&lt;li&gt;Memory duplication&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You don’t fix this with faster code. You remove the layer entirely.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Actual Edge: Shared Memory + Zero-Copy Semantics
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;POSIX shared memory (mmap)&lt;/strong&gt; creates a single physical memory region&lt;/li&gt;
&lt;li&gt;C++ writes directly into a &lt;strong&gt;lock-free ring buffer&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Python maps the same region—no transfer, no duplication&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now combine that with &lt;strong&gt;Flatbuffers&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data is read &lt;strong&gt;in-place&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;No deserialization&lt;/li&gt;
&lt;li&gt;No object creation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Result:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Zero IPC overhead&lt;/li&gt;
&lt;li&gt;Zero-copy reads&lt;/li&gt;
&lt;li&gt;Minimal GC pressure&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You didn’t “speed things up.” You &lt;strong&gt;eliminated an entire class of latency&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Where Most Systems Blow Up: Unbounded Intelligence
&lt;/h2&gt;

&lt;p&gt;Fast systems fail faster.&lt;/p&gt;

&lt;p&gt;An ML model making decisions at microsecond scale without constraints is a liability, not an advantage.&lt;/p&gt;

&lt;p&gt;So you enforce &lt;strong&gt;physics over intelligence&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  The Shadow Book (Local Reality Approximation)
&lt;/h3&gt;

&lt;p&gt;Markets have latency. Your system shouldn’t pretend they don’t.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Maintain an internal, optimistic state of positions&lt;/li&gt;
&lt;li&gt;Assume fills before confirmation&lt;/li&gt;
&lt;li&gt;Prevent duplicate or conflicting orders&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without this, your strategy degenerates into self-induced noise.&lt;/p&gt;




&lt;h3&gt;
  
  
  The Watchdog (Control Plane, Not Feature)
&lt;/h3&gt;

&lt;p&gt;Your smartest component is also your most fragile.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;External process monitors heartbeat (e.g., ZeroMQ)&lt;/li&gt;
&lt;li&gt;Missed signal = immediate termination&lt;/li&gt;
&lt;li&gt;No recovery logic inside the failing system&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You don’t debug a live trading engine. You &lt;strong&gt;kill it before it damages capital&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  What “Vibe Coders” Miss Entirely
&lt;/h2&gt;

&lt;p&gt;They focus on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Writing code faster&lt;/li&gt;
&lt;li&gt;Generating features&lt;/li&gt;
&lt;li&gt;Plugging models&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They ignore:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Memory layout&lt;/li&gt;
&lt;li&gt;Cache locality&lt;/li&gt;
&lt;li&gt;Allocation patterns&lt;/li&gt;
&lt;li&gt;Failure isolation&lt;/li&gt;
&lt;li&gt;Deterministic execution guarantees&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That’s why their systems look impressive—and fail silently under load.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final Reality
&lt;/h2&gt;

&lt;p&gt;AI can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Generate syntax&lt;/li&gt;
&lt;li&gt;Suggest patterns&lt;/li&gt;
&lt;li&gt;Accelerate iteration&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AI cannot:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Design memory-safe, latency-deterministic systems&lt;/li&gt;
&lt;li&gt;Anticipate race conditions across processes&lt;/li&gt;
&lt;li&gt;Enforce risk boundaries under real-world constraints&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you don’t understand the machine at the level of &lt;strong&gt;memory, scheduling, and physics&lt;/strong&gt;, you’re not building an HFT system.&lt;/p&gt;

&lt;p&gt;You’re just simulating one—until the market proves otherwise.&lt;/p&gt;

</description>
      <category>systems</category>
      <category>cpp</category>
      <category>python</category>
      <category>architecture</category>
    </item>
    <item>
      <title>Why AI-Powered IPS Systems Fail and How I Reduced False Positives by 96% Without Blocking Traffic</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Sun, 15 Feb 2026 18:07:19 +0000</pubDate>
      <link>https://dev.to/mrvenom17/why-ai-powered-ips-systems-fail-and-how-i-reduced-false-positives-by-96-without-blocking-traffic-p0l</link>
      <guid>https://dev.to/mrvenom17/why-ai-powered-ips-systems-fail-and-how-i-reduced-false-positives-by-96-without-blocking-traffic-p0l</guid>
      <description>&lt;p&gt;Intrusion Prevention Systems (IPS) don’t usually fail because the models are weak.&lt;br&gt;
They fail because &lt;strong&gt;detection and enforcement are tightly coupled&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Most modern “AI-IPS” designs still follow the same flawed logic:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Detect → Decide → Block&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This works in controlled benchmarks.&lt;br&gt;
It collapses in production.&lt;/p&gt;

&lt;p&gt;In this post, I’ll explain:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;why false positives explode in AI-IPS systems,&lt;/li&gt;
&lt;li&gt;why better models alone don’t solve the problem,&lt;/li&gt;
&lt;li&gt;and how a &lt;strong&gt;staged, decoupled architecture with honeypot feedback&lt;/strong&gt; reduced false positives by &lt;strong&gt;96%&lt;/strong&gt; in my prototype — without blocking benign traffic.&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;
  
  
  The Core Problem: IPS Is Treated as a Classification Task
&lt;/h2&gt;

&lt;p&gt;Most AI-IPS pipelines are framed as binary classification:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Traffic → Features → Model → {Malicious | Benign}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The implicit assumption:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;High confidence = safe to enforce&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Low confidence = model problem&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That assumption is wrong.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why?
&lt;/h3&gt;

&lt;p&gt;Because &lt;strong&gt;network traffic is adversarial, ambiguous, and non-stationary&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Even a 98% accurate classifier can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;block legitimate but rare traffic,&lt;/li&gt;
&lt;li&gt;mislabel new application behaviors,&lt;/li&gt;
&lt;li&gt;fail catastrophically during distribution shifts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In production, &lt;strong&gt;false positives are more damaging than false negatives&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;They break services&lt;/li&gt;
&lt;li&gt;Trigger alert fatigue&lt;/li&gt;
&lt;li&gt;Force operators to disable enforcement entirely&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That’s why many IPS deployments quietly downgrade into IDS-only mode.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Real Issue: Detection ≠ Decision
&lt;/h2&gt;

&lt;p&gt;The mistake is architectural, not statistical.&lt;/p&gt;

&lt;p&gt;Most systems bind:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;detection certainty&lt;/em&gt; directly to &lt;em&gt;enforcement action&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In reality, &lt;strong&gt;“uncertain” traffic is not “benign” or “malicious”&lt;/strong&gt;.&lt;br&gt;
It’s &lt;em&gt;unverified&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Treating uncertainty as a classification failure guarantees noise.&lt;/p&gt;




&lt;h2&gt;
  
  
  My Approach: Decoupled, Staged Validation
&lt;/h2&gt;

&lt;p&gt;Instead of asking:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Is this packet malicious?”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;I reframed the problem as:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“How much confidence do we have &lt;em&gt;right now&lt;/em&gt; to enforce action?”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  High-level architecture
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Traffic
  ↓
Fast ML Detection Layer
  ↓
Confidence-based Routing
  ├── High confidence → Immediate enforcement
  ├── Low confidence → Pass-through
  └── Ambiguous → Dynamic honeypot / sandbox
                     ↓
              Behavioral verification
                     ↓
               Feedback to detector
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The key shift:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Detection produces a signal&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Decision is deferred unless confidence is sufficient&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Why Honeypots Matter (and Not as Traps)
&lt;/h2&gt;

&lt;p&gt;In this system, honeypots are &lt;strong&gt;not&lt;/strong&gt; passive decoys.&lt;/p&gt;

&lt;p&gt;They are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;verification instruments&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;used only for &lt;em&gt;ambiguous traffic&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;dynamically selected based on protocol and behavior&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Instead of blocking suspicious flows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I let them interact in a controlled environment&lt;/li&gt;
&lt;li&gt;observe command patterns, persistence, retries, payload changes&lt;/li&gt;
&lt;li&gt;and then &lt;strong&gt;retroactively update trust&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This turns uncertainty into signal.&lt;/p&gt;




&lt;h2&gt;
  
  
  Results (Prototype Evaluation)
&lt;/h2&gt;

&lt;p&gt;Using the &lt;strong&gt;UNSW-NB15 dataset&lt;/strong&gt; as a baseline:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Baseline false positive rate: &lt;strong&gt;12.8%&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;After staged validation: &lt;strong&gt;0.48%&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Net reduction: &lt;strong&gt;~96.2%&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Latency impact:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ML inference: ~0.003–0.007 ms amortized per flow under batched execution (batch size dynamically determined by ingress buffering and scheduler constraints (≈143,000 flows/sec))&lt;/li&gt;
&lt;li&gt;Honeypot routing: applied only to the ambiguous traffic subset, leaving high-confidence benign and malicious flows on the fast path&lt;/li&gt;
&lt;li&gt;Overall impact: no blanket performance degradation on backbone traffic, as enforcement and verification are decoupled from primary detection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Crucially:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;No legitimate traffic was blocked purely on model output&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Enforcement only happened after behavioral confirmation&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Why This Works Better Than “Better Models”
&lt;/h2&gt;

&lt;p&gt;I tried:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;deeper ensembles&lt;/li&gt;
&lt;li&gt;tighter thresholds&lt;/li&gt;
&lt;li&gt;feature engineering&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All of them helped marginally.&lt;/p&gt;

&lt;p&gt;None solved the core issue.&lt;/p&gt;

&lt;p&gt;The improvement came from &lt;strong&gt;system design&lt;/strong&gt;, not model tuning.&lt;/p&gt;

&lt;p&gt;Key principles:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Separate &lt;em&gt;signal generation&lt;/em&gt; from &lt;em&gt;action&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Treat uncertainty as a first-class state&lt;/li&gt;
&lt;li&gt;Use interaction, not prediction, to resolve ambiguity&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Implications for AI Security Systems
&lt;/h2&gt;

&lt;p&gt;This pattern generalizes beyond IPS:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fraud detection&lt;/li&gt;
&lt;li&gt;Abuse prevention&lt;/li&gt;
&lt;li&gt;Account takeover detection&lt;/li&gt;
&lt;li&gt;Even EO/GeoAI risk verification&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Anywhere false positives are expensive:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Decoupling detection from enforcement is mandatory.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  What I’d Do Next
&lt;/h2&gt;

&lt;p&gt;If this were production-bound:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Replace static honeypots with adaptive service emulations&lt;/li&gt;
&lt;li&gt;Add long-term trust scoring&lt;/li&gt;
&lt;li&gt;Integrate cross-session behavioral memory&lt;/li&gt;
&lt;li&gt;Move toward agent-based verification instead of rule-bound traps&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Closing Thought
&lt;/h2&gt;

&lt;p&gt;AI doesn’t fail security systems.&lt;br&gt;
&lt;strong&gt;Coupling does.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If your system can’t say &lt;em&gt;“I’m not sure yet”&lt;/em&gt;,&lt;br&gt;
it will eventually say &lt;em&gt;“block everything”&lt;/em&gt; — or nothing at all.&lt;/p&gt;




&lt;h1&gt;
  
  
  By
&lt;/h1&gt;

&lt;p&gt;Alay Sharma&lt;/p&gt;

</description>
      <category>ai</category>
      <category>architecture</category>
      <category>cybersecurity</category>
      <category>networking</category>
    </item>
    <item>
      <title>The Domestic Turn of Information Warfare: When Democracies Target Their Own Minds</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Mon, 10 Nov 2025 18:01:59 +0000</pubDate>
      <link>https://dev.to/mrvenom17/the-domestic-turn-of-information-warfare-when-democracies-target-their-own-minds-2gbd</link>
      <guid>https://dev.to/mrvenom17/the-domestic-turn-of-information-warfare-when-democracies-target-their-own-minds-2gbd</guid>
      <description>&lt;p&gt;By Alay Sharma&lt;/p&gt;

&lt;p&gt;The 20th century taught nations to fear bombs and borders.&lt;br&gt;
The 21st will teach them to fear their own narratives.&lt;/p&gt;

&lt;p&gt;The Paradox&lt;br&gt;
For decades, democracies framed information warfare as an external threat a battle waged by adversaries seeking to distort elections, destabilize institutions, or polarize societies. But in the past five years, a quieter transformation has begun.&lt;br&gt;
The very tools once built to defend truth from foreign interference are now being repurposed internally not by rogue actors, but by states, corporations, and political machines operating within the democratic framework itself.&lt;/p&gt;

&lt;p&gt;The paradox is stark:&lt;br&gt;
To defend citizens from manipulation, democracies have started to master manipulation.&lt;/p&gt;

&lt;p&gt;From Propaganda to Persuasion Architecture&lt;br&gt;
Information control no longer looks like wartime censorship. It looks like algorithmic persuasion the ability to engineer emotional response through feeds, recommendation systems, and data-driven behavioral nudges.&lt;br&gt;
The battlefield has shifted from the public square to the private scroll.&lt;br&gt;
The weapons are no longer slogans, but signal amplification models trained on human attention itself.&lt;br&gt;
Where propaganda once shouted, persuasion architectures whisper reshaping opinion invisibly, efficiently, and, most dangerously, legally.&lt;/p&gt;

&lt;p&gt;The Dual Use Dilemma&lt;br&gt;
Every information weapon has a dual-use problem.&lt;br&gt;
The same AI models that detect disinformation can be tuned to suppress dissent.&lt;br&gt;
The same behavioral analytics that build resilience against influence can be used to micro-target emotional vulnerabilities in the name of engagement or “national harmony.”&lt;br&gt;
It is not foreign powers that pose the gravest long-term cognitive risk to democracies it’s the normalization of domestic influence infrastructure.&lt;br&gt;
When democracies adopt the tools of control once feared in authoritarian regimes, they no longer defend minds they occupy them.&lt;/p&gt;

&lt;p&gt;The Cognitive Erosion of Freedom&lt;br&gt;
Freedom of speech is often misunderstood as the freedom to speak.&lt;br&gt;
In the digital age, its true essence is the freedom to think unshaped.&lt;br&gt;
When every exposure, every frame, and every search result is optimized for persuasion, the population becomes a substrate for behavioral engineering.&lt;br&gt;
At that point, the distinction between defense and domestic cognitive warfare collapses.&lt;br&gt;
This is how democracies erode not through coups or censorship, but through algorithmic paternalism: the quiet conviction that citizens must be guided for their own good.&lt;/p&gt;

&lt;p&gt;A Call for Cognitive Ethics&lt;br&gt;
The real defense now lies not in counter-propaganda, but in cognitive ethics frameworks governance models that separate defensive information operations from domestic influence systems.&lt;br&gt;
Just as we drew bright lines around biological weapons and nuclear deterrence, we must establish norms around cognitive sovereignty:&lt;/p&gt;

&lt;p&gt;Prohibit the use of psychological manipulation tools on domestic populations.&lt;/p&gt;

&lt;p&gt;Enforce transparency for algorithmic narrative shaping.&lt;/p&gt;

&lt;p&gt;Protect the cognitive commons the shared mental environment—as a democratic institution.&lt;br&gt;
Without these norms, democracies will win the information war against their enemies, only to lose it against themselves.&lt;/p&gt;

&lt;p&gt;The Closing Question&lt;br&gt;
If truth becomes programmable, and persuasion becomes policy &lt;br&gt;
who will defend the human mind from its own defenders?&lt;/p&gt;

&lt;h1&gt;
  
  
  InformationWarfare #CognitiveSovereignty #AIethics #NationalSecurity #DigitalGovernance #Democracy #PsychologicalOperations #MediaStrategy #CyberPolicy
&lt;/h1&gt;

</description>
      <category>cognitivesovereignty</category>
      <category>nationalsecurity</category>
      <category>digitalgovernance</category>
    </item>
    <item>
      <title>The next great battleground isn’t oil, chips, or data. It’s your mind.</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Wed, 10 Sep 2025 17:46:35 +0000</pubDate>
      <link>https://dev.to/mrvenom17/the-next-great-battleground-isnt-oil-chips-or-data-its-your-mind-1p5p</link>
      <guid>https://dev.to/mrvenom17/the-next-great-battleground-isnt-oil-chips-or-data-its-your-mind-1p5p</guid>
      <description>&lt;p&gt;UCLA recently revealed a groundbreaking innovation: a non-invasive brain-computer interface that enhances real-world task performance by 4 times. This advancement, achieved through a wearable EEG device paired with AI, eliminates the need for surgery or implants.&lt;/p&gt;

&lt;p&gt;Simultaneously, the BRICS group, now comprising 10 members and 10 partners, is transcending its economic origins to become a formidable alternative governance model challenging Western systems.&lt;/p&gt;

&lt;p&gt;A significant concern arises with the potential vulnerability of one's thoughts if accessible through a headset, opening avenues for theft, manipulation, and even weaponization. The battleground has shifted from phones and data to the realm of cognition itself.&lt;/p&gt;

&lt;p&gt;As nations grapple with the implications, the erosion of sovereignty looms large when control over shaping minds and securing signals is compromised. The rivalry between BRICS and the West extends beyond traditional realms to defining standards for mental autonomy.&lt;/p&gt;

&lt;p&gt;The proposed solution and call to action revolve around the necessity for Cognitive Constitutions akin to trade treaties of the past. Just as nuclear deterrence and financial security shaped previous eras, safeguarding neural data is poised to define the future landscape.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>IntelPatch: An Autonomous AI-Powered CVE Intelligence System</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Tue, 15 Jul 2025 21:45:02 +0000</pubDate>
      <link>https://dev.to/mrvenom17/intelpatch-an-autonomous-ai-powered-cve-intelligence-system-4hho</link>
      <guid>https://dev.to/mrvenom17/intelpatch-an-autonomous-ai-powered-cve-intelligence-system-4hho</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;Can an AI system understand vulnerabilities, evaluate risk, and suggest mitigations — all without human help?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That’s what I set out to build with &lt;strong&gt;IntelPatch&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔥 What is IntelPatch?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;IntelPatch&lt;/strong&gt; is a fully autonomous, multi-agent &lt;strong&gt;CVE intelligence system&lt;/strong&gt; that parses real-world CVEs, simulates red-team reasoning, and generates human-grade vulnerability insights and patch recommendations.&lt;/p&gt;

&lt;p&gt;It's built using &lt;a href="https://github.com/Camel-AI/OWL" rel="noopener noreferrer"&gt;CamelAI’s OWL framework&lt;/a&gt;, and can run completely &lt;strong&gt;offline&lt;/strong&gt; via &lt;strong&gt;Ollama&lt;/strong&gt;, making it ideal for secure environments.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 What It Does
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;🧾 Scrapes and parses CVEs in real-time
&lt;/li&gt;
&lt;li&gt;🧠 Uses multiple reasoning agents to analyze severity and exploitability
&lt;/li&gt;
&lt;li&gt;🛠️ Suggests practical mitigations based on past exploits, configs, and patch databases
&lt;/li&gt;
&lt;li&gt;🔍 Scores risk based on CVSS, historical PoCs, and impact vectors
&lt;/li&gt;
&lt;li&gt;📦 All running &lt;strong&gt;fully locally&lt;/strong&gt; with no internet dependency&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  ⚙️ Tech Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Languages&lt;/strong&gt;: Python (agents, parsing), Shell (automation)
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;LLM Integration&lt;/strong&gt;: Ollama (offline LLM serving)
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multi-Agent System&lt;/strong&gt;: CamelAI OWL framework
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Data Sources&lt;/strong&gt;: MITRE CVE feeds, ExploitDB, vendor advisories
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Design Pattern&lt;/strong&gt;: Autonomous role-based agents with task delegation&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧩 How It Works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;CVE Ingestion Agent&lt;/strong&gt; → pulls recent CVEs
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Parsing Agent&lt;/strong&gt; → extracts vulnerability fields
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Risk Agent&lt;/strong&gt; → analyzes threat level &amp;amp; known exploits
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mitigation Agent&lt;/strong&gt; → suggests fixes and patches
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Summarization Agent&lt;/strong&gt; → generates human-readable report
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each agent operates independently, communicates via a shared memory channel, and reasons using OWL's role-based planner.&lt;/p&gt;




&lt;h2&gt;
  
  
  💡 Why I Built This
&lt;/h2&gt;

&lt;p&gt;Manual CVE triage is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🔁 Repetitive&lt;/li&gt;
&lt;li&gt;🧍 Prone to error&lt;/li&gt;
&lt;li&gt;🐢 Slow during active threat windows&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;IntelPatch acts as a &lt;strong&gt;virtual analyst&lt;/strong&gt;, automating threat evaluation so defenders can respond &lt;strong&gt;faster and smarter.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔗 Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;📦 GitHub: &lt;a href="https://github.com/mrvenom17/intel-patch" rel="noopener noreferrer"&gt;https://github.com/mrvenom17/intel-patch&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;📜 Full README: Includes architecture + agent breakdown
&lt;/li&gt;
&lt;li&gt;🌐 Portfolio: &lt;a href="https://moonlit-klepon-30e315.netlify.app/" rel="noopener noreferrer"&gt;https://alay.vercel.app&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  📈 What’s Next?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;[ ] Add CVE → PoC → Patch mapping using ExploitDB
&lt;/li&gt;
&lt;li&gt;[ ] Integrate a local vector DB for semantic similarity
&lt;/li&gt;
&lt;li&gt;[ ] Add scoring dashboard with charts + risk heatmaps
&lt;/li&gt;
&lt;li&gt;[ ] Add PoC testing in sandboxed environment&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  - [ ] Submit to CamelAI + OWL agent gallery
&lt;/h2&gt;

&lt;p&gt;IntelPatch isn’t a script — it’s a &lt;strong&gt;thinking system&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;
Built solo. Fully open source. Always improving.&lt;/p&gt;

&lt;p&gt;If you work in threat intel, cyber defense, or autonomous systems — I’d love your feedback or collab. Let’s build machines that defend like humans, but faster.&lt;/p&gt;

&lt;p&gt;→ Drop a ⭐ on GitHub&lt;br&gt;&lt;br&gt;
→ Comment or share if this resonates&lt;/p&gt;

&lt;p&gt;— &lt;strong&gt;Alay Sharma&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>python</category>
      <category>automaton</category>
    </item>
    <item>
      <title>SecureShare: A Zero-Knowledge, Blockchain-Powered Platform for Secure File Sharing</title>
      <dc:creator>Alay Sharma</dc:creator>
      <pubDate>Tue, 15 Jul 2025 21:32:47 +0000</pubDate>
      <link>https://dev.to/mrvenom17/secureshare-a-zero-knowledge-blockchain-powered-platform-for-secure-file-sharing-2048</link>
      <guid>https://dev.to/mrvenom17/secureshare-a-zero-knowledge-blockchain-powered-platform-for-secure-file-sharing-2048</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6bslw4t8nvgqpojnzer5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6bslw4t8nvgqpojnzer5.png" alt=" " width="800" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Imagine sharing sensitive files — medical records, legal docs, or private datasets — with someone halfway across the world…&lt;br&gt;&lt;br&gt;
Without trusting Google, Dropbox, or &lt;em&gt;anyone&lt;/em&gt; in between.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;🔐 That’s what I built: &lt;strong&gt;SecureShare&lt;/strong&gt; — a &lt;strong&gt;blockchain-powered, zero-knowledge file sharing platform&lt;/strong&gt; with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;📦 On-chain access control (no centralized permissions)&lt;/li&gt;
&lt;li&gt;🔐 Client-side encryption (data stays yours)&lt;/li&gt;
&lt;li&gt;📜 Immutable audit logs (for compliance + accountability)&lt;/li&gt;
&lt;li&gt;🔄 Real-time notifications + access tracking&lt;/li&gt;
&lt;li&gt;🔓 Role-based access control + enterprise SSO&lt;/li&gt;
&lt;li&gt;⚡ Layer-2 support for gas savings (Polygon, Arbitrum)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🚀 Tech Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Frontend&lt;/strong&gt;: React 18 + TypeScript + TailwindCSS + Zustand
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Blockchain&lt;/strong&gt;: Solidity + Sepolia Testnet + Wagmi + Viem
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Backend&lt;/strong&gt;: Node.js + Express + SQLite + Prisma
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security&lt;/strong&gt;: CryptoJS encryption, JWT auth, Helmet, Rate Limiting
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UI/UX&lt;/strong&gt;: Framer Motion + drag-n-drop upload zone + WebSocket updates&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🛠 How It Works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;You connect your wallet (MetaMask or any EVM-compatible)&lt;/li&gt;
&lt;li&gt;Upload a file → it gets &lt;strong&gt;client-side encrypted&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;File hash is stored on-chain + mapped to your wallet&lt;/li&gt;
&lt;li&gt;You grant access to other Ethereum addresses (RBAC-style)&lt;/li&gt;
&lt;li&gt;All access grants/revokes are logged immutably on the blockchain&lt;/li&gt;
&lt;li&gt;Your dashboard shows every access event, confirmed on-chain&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Every file, every access, every log — fully transparent, fully trustless.&lt;/p&gt;




&lt;h2&gt;
  
  
  🌐 Why This Matters
&lt;/h2&gt;

&lt;p&gt;We’re entering a world where &lt;strong&gt;data sovereignty and privacy&lt;/strong&gt; are non-negotiable.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🔎 Centralized systems can be hacked, censored, or tampered with
&lt;/li&gt;
&lt;li&gt;🧠 Blockchain lets us build trustless systems with &lt;em&gt;verifiable&lt;/em&gt; permissions
&lt;/li&gt;
&lt;li&gt;🛡️ Zero-knowledge and encryption ensure &lt;em&gt;privacy without compromise&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;⚙️ Enterprises need compliance (GDPR, HIPAA, SOX) — SecureShare bakes that in&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether it’s used by healthcare firms, legal teams, journalists, or decentralized orgs — SecureShare ensures &lt;strong&gt;you control who sees your data, and when.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔗 Project Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;💻 GitHub Repo: &lt;a href="https://github.com/mrvenom17/SecureShare" rel="noopener noreferrer"&gt;SecureShare&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;🌐 Live Demo: &lt;a href="https://secureshareforanonimity.netlify.app/" rel="noopener noreferrer"&gt;https://secureshareforanonimity.netlify.app/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  👨‍💻 What’s Next?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;IPFS + Filecoin integration
&lt;/li&gt;
&lt;li&gt;zk-SNARK-based permission verification
&lt;/li&gt;
&lt;li&gt;White-label SaaS for enterprises
&lt;/li&gt;
&lt;li&gt;SDK + REST API for dev integrations&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Built it solo, from scratch — code, contracts, infra, UI, security.&lt;/p&gt;

&lt;p&gt;Would love feedback, collaborations, or feature requests.&lt;br&gt;&lt;br&gt;
Let’s build sovereign systems — where you own your data, not rent it.&lt;/p&gt;

&lt;p&gt;Drop a star ⭐ or DM anytime.&lt;/p&gt;

&lt;p&gt;— &lt;strong&gt;Alay Sharma&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Blockchain #CyberSecurity #Web3 #ZeroKnowledge #Privacy #SaaS #React #OpenSource #Solidity #Ethereum
&lt;/h1&gt;

</description>
      <category>web3</category>
      <category>cybersecurity</category>
      <category>zeroknowledge</category>
    </item>
  </channel>
</rss>
