Skip to main content
CryptoFlex LLC
Series

Security Engineering

5 posts in this series

1

A security professional audits his own code: blog posts leaking private repo names, query-string secrets in browser history, SSRF vectors, and error messages handing attackers the database schema. 19 findings and the journey to fix every one.

Chris Johnson··14 min read
2

I've managed firewalls for years. When it came time to add WAF protection to my own site, I evaluated Cloudflare's free tier against Vercel's built-in WAF. Here's the comparison, the implementation, the config that broke the build, and the curl tests that proved it all works.

Chris Johnson··12 min read
3

I tasked four AI agents with auditing my production site for OWASP vulnerabilities. They found 16 findings, fixed 6, and wrote 37 tests in under 30 minutes. Traditional pentesting may never be the same, but red teamers shouldn't worry.

Chris Johnson··18 min read
4

A pairing/admin-approval privilege escalation CVE hit OpenClaw. My security agent ran a threat hunt, my builder agent implemented a Security Panel on the Mission Control dashboard, and 15 files later the system can see itself. Here is the full story.

Chris Johnson··18 min read
5

How a routine search for blog content tools led to discovering critical security risks in a popular MCP server, and why I built my own secure alternative.

Chris Johnson··14 min read

Navigation

Blog Posts

↑↓ navigate openesc close