3d ago · 3 min read · As part of my cybersecurity learning journey, I built a deliberately vulnerable web application using Python and Flask. The goal of this project was to understand how common web vulnerabilities work i
Join discussion
Mar 7 · 8 min read · When Librarian gets asked about tcache stashing, it needs to return something more useful than what a base Claude model knows. The model has a general understanding of heap exploitation — it can describe what tcache is, explain the concept of a stash...
Join discussionMar 7 · 4 min read · Final result: rank #20 out of 362 teams. 40 of 44 challenges solved. 24 hours of unattended autonomous operation. These numbers revealed something we didn't expect — not about the AI, but about what structured agent coordination makes possible. The T...
Join discussion