Le Duy Khuong

Topics

146 topics across all posts

Claude Code

20

What Is Claude Code — and Why You Need an Agent Harness

Cursor

16

Claude Code on Cursor and Other IDEs

Supabase

12

Supabase overview

Postgres

6

Supabase overview

AI agent

5

Personal AI Agents Are NOT Multi-Tenant — Why That Changes Everything

Backend

5

Supabase overview

Vaultwarden

5

Why You Need a Secret Manager — Beyond .env Files

commands

4

What Is Claude Code — and Why You Need an Agent Harness

Composer

4

What Is Cursor — AI IDE vs Chat

workflow

4

Skills — Define Workflows for Your Agent

Agent

3

What Is Cursor — AI IDE vs Chat

codebase

3

Create a Skill From Your Codebase

context

3

Keep Context Across Sessions — Memory Persistence

Secret Management

3

Credential Management in AI Infrastructure — Beyond .env Files

skills

3

Extension Architecture — Skills, Plugins, and Hooks (Pick the Right One)

automation

2

From Personal Bot to Team Platform — A Migration Playbook

Baas

2

Supabase overview

checkpoint

2

Verification — Checkpoint and Verify

CLI

2

Install and Run Claude Code — First Time

compaction

2

Secrets, Memory, and the Art of Not Leaking Everything

Container Security

2

Container Hardening 101 — From 'It Works' to 'It Is Safe'

hooks

2

Extension Architecture — Skills, Plugins, and Hooks (Pick the Right One)

MCP

2

MCP — Model Context Protocol and Tools

memory

2

Secrets, Memory, and the Art of Not Leaking Everything

multi-agent

2

From Personal Bot to Team Platform — A Migration Playbook

rules

2

What Is Claude Code — and Why You Need an Agent Harness

Schema

2

Postgres schema and table design

security

2

Personal AI Agents Are NOT Multi-Tenant — Why That Changes Everything

setup

2

Install and Run Claude Code — First Time

TDD

2

TDD with Claude Code

Zero Trust

2

Security Tools as Attack Surface — The Paradox of Defense-in-Depth

@

1

Context with @ and # — Give AI the Right Input

#

1

Context with @ and # — Give AI the Right Input

agent harness

1

What Is Claude Code — and Why You Need an Agent Harness

Agent mode

1

Agent Mode — AI Works Proactively with Your Code

Agent Safety

1

Security in the AI Agent Era — We Are Not Ready

agents

1

Agents — Subagents and When to Delegate

AGENTS.md

1

Rules — Guide AI by Project and Personal Conventions

AI Infrastructure

1

When Your AI Tool Gets Poisoned — Anatomy of a Supply Chain Attack

AI Security

1

Security in the AI Agent Era — We Are Not Ready

ai-agents

1

Atomic Habits × AI Agents — Khi thói quen gặp hệ thống thông minh

Api

1

API: PostgREST vs custom API and when to use which

architecture

1

Extension Architecture — Skills, Plugins, and Hooks (Pick the Right One)

Auth

1

Auth: JWT, session and backend integration

BaaS

1

Series: Supabase from setup to deploy

Backup

1

Backup & Disaster Recovery — Your Vault Is Your Lifeline

book-review

1

Atomic Habits × AI Agents — Khi thói quen gặp hệ thống thông minh

breakpoint

1

When to Compact Context — Strategic Compaction

Chat

1

Chat vs Composer — Two Ways to Interact

checklist

1

Wrap-Up — From Zero to Cursor Proficient

CI/CD Security

1

Security Tools as Attack Surface — The Paradox of Defense-in-Depth

Cicd

1

Deploy, CI/CD and multi-project

Cli

1

Project setup, CLI and environment variables

Cloud Agents

1

Cloud Agents and Working Across Devices

Cloudflare

1

Cloudflare Tunnel + Zero Trust — Secure External Access Without Port Forwarding

coding style

1

Rules — Guidelines Always Applied

Container Registry

1

Floating Tags & Auto-Updaters — Silent Backdoors in Your Docker Stack

continuous learning

1

Learn From Sessions — Continuous Learning (Instincts)

convention

1

Rules — Guidelines Always Applied

cost

1

Tokens and Cost — Model Choice, Thinking Tokens

coverage

1

TDD with Claude Code

Credential Lifecycle

1

Credential Management in AI Infrastructure — Beyond .env Files

cron

1

From Personal Bot to Team Platform — A Migration Playbook

Database

1

Postgres schema and table design

Defense in Depth

1

Container Hardening 101 — From 'It Works' to 'It Is Safe'

Dependency Auditing

1

Dependency Poisoning — When pip install Becomes a Weapon

Deploy

1

Deploy, CI/CD and multi-project

Devops

1

Deploy, CI/CD and multi-project

DevSecOps

1

Why You Need a Secret Manager — Beyond .env Files

diff

1

Review Diff and Accept Changes Safely

Disaster Recovery

1

Backup & Disaster Recovery — Your Vault Is Your Lifeline

Docker

1

Docker Security Hardening for Vaultwarden — Production-Ready Setup

Docker Security

1

Floating Tags & Auto-Updaters — Silent Backdoors in Your Docker Stack

documentation

1

What to Read — Shorthand vs Deep-Dive

Edge-functions

1

Realtime and Edge Functions

Env

1

Project setup, CLI and environment variables

eval

1

Verification — Checkpoint and Verify

exec approvals

1

8 Layers of Tool Security — How to Not Let Your AI Bot rm -rf /

extension

1

Extension Architecture — Skills, Plugins, and Hooks (Pick the Right One)

harness

1

Claude Code on Cursor and Other IDEs

heartbeat

1

From Personal Bot to Team Platform — A Migration Playbook

history

1

Checkpoints and History — Undo Safely

Hooks

1

Hooks — Automate on Events

Image Pinning

1

Floating Tags & Auto-Updaters — Silent Backdoors in Your Docker Stack

Incident Response

1

When Your AI Tool Gets Poisoned — Anatomy of a Supply Chain Attack

instincts

1

Learn From Sessions — Continuous Learning (Instincts)

Jwt

1

Auth: JWT, session and backend integration

Linux Capabilities

1

Container Hardening 101 — From 'It Works' to 'It Is Safe'

mcp.json

1

MCP — Connect Tools and External Data

migration

1

From Personal Bot to Team Platform — A Migration Playbook

Migrations

1

Migrations: write and apply

MITRE ATLAS

1

8 Layers of Tool Security — How to Not Let Your AI Bot rm -rf /

model

1

Tokens and Cost — Model Choice, Thinking Tokens

multi-tenant

1

Personal AI Agents Are NOT Multi-Tenant — Why That Changes Everything

OpenClaw

1

Personal AI Agents Are NOT Multi-Tenant — Why That Changes Everything

orchestration

1

Multi-Agent and Multi-Service Workflows

Orm

1

Prisma + Supabase: connect and sync schema

Package Security

1

Dependency Poisoning — When pip install Becomes a Weapon

Plan mode

1

Plan Mode — Plan Before You Code

planner

1

Agents — Subagents and When to Delegate

plugin

1

Install and Run Claude Code — First Time

plugins

1

Extension Architecture — Skills, Plugins, and Hooks (Pick the Right One)

PostgreSQL

1

Series: Supabase from setup to deploy

Postgrest

1

API: PostgREST vs custom API and when to use which

Prisma

1

Prisma + Supabase: connect and sync schema

privacy

1

Secrets, Memory, and the Art of Not Leaking Everything

production

1

Wrap-Up — From Zero to Production-Ready

productivity

1

Atomic Habits × AI Agents — Khi thói quen gặp hệ thống thông minh

prompt injection

1

8 Layers of Tool Security — How to Not Let Your AI Bot rm -rf /

reading

1

What to Read — Shorthand vs Deep-Dive

Realtime

1

Realtime and Edge Functions

review

1

Review Diff and Accept Changes Safely

reviewer

1

Agents — Subagents and When to Delegate

Rls

1

Row Level Security (RLS) and policies

Rules

1

Rules — Guide AI by Project and Personal Conventions

sandbox

1

8 Layers of Tool Security — How to Not Let Your AI Bot rm -rf /

secret

1

Security — Config and Secrets

SecretRef

1

Secrets, Memory, and the Art of Not Leaking Everything

secrets management

1

Secrets, Memory, and the Art of Not Leaking Everything

Security

1

Row Level Security (RLS) and policies

Self-Hosted

1

Vaultwarden Overview — Bitwarden-Compatible, Rust-Powered

Series

1

Series: Supabase from setup to deploy

Serverless

1

Realtime and Edge Functions

session

1

Keep Context Across Sessions — Memory Persistence

session isolation

1

Personal AI Agents Are NOT Multi-Tenant — Why That Changes Everything

skill

1

Create a Skill From Your Codebase

SKILL.md

1

Extension Architecture — Skills, Plugins, and Hooks (Pick the Right One)

slash

1

Commands — Slash Commands and Quick Workflows

subagents

1

Agents — Subagents and When to Delegate

Supply Chain

1

Dependency Poisoning — When pip install Becomes a Weapon

Supply Chain Attestation

1

Security Tools as Attack Surface — The Paradox of Defense-in-Depth

Supply Chain Security

1

When Your AI Tool Gets Poisoned — Anatomy of a Supply Chain Attack

team deployment

1

From Personal Bot to Team Platform — A Migration Playbook

Telegram bot

1

From Personal Bot to Team Platform — A Migration Playbook

Threat Landscape

1

Security in the AI Agent Era — We Are Not Ready

token

1

Tokens and Cost — Model Choice, Thinking Tokens

token security

1

Secrets, Memory, and the Art of Not Leaking Everything

tool

1

MCP — Model Context Protocol and Tools

tool events

1

Hooks — Automate on Tool Events

tool policy

1

8 Layers of Tool Security — How to Not Let Your AI Bot rm -rf /

tool security

1

8 Layers of Tool Security — How to Not Let Your AI Bot rm -rf /

trigger

1

Skills — Define Workflows for Your Agent

trust model

1

Personal AI Agents Are NOT Multi-Tenant — Why That Changes Everything

Vault Architecture

1

Credential Management in AI Infrastructure — Beyond .env Files

verification

1

Verification — Checkpoint and Verify

wrap-up

1

Wrap-Up — From Zero to Production-Ready