Before The Commit cover art

Before The Commit

Before The Commit

By: Danny Gershman Dustin Hilgaertner
Listen for free

AI is writing your code. Who's watching the AI? Before The Commit explores AI coding security, emerging threats, and the trends reshaping software development. Hosts Danny Gershman and Dustin Hilgaertner break down threat models, prompt injection, shadow AI, and practical defenses — drawing from experience across defense, fintech, and enterprise environments. Companion to the book Before The Commit: Securing AI in the Age of Autonomous Code. No hype, just tactical insight for developers, security engineers, and leaders building in the AI era.2026 Danny Gershman, Dustin Hilgaertner
Episodes
  • Episode 31: Sam Kassoumeh, Co-Founder @ SecurityScorecard
    May 22 2026

    The conversation covers the topics of AI security gateways, SaaS-based companies, AI in coding, the evolution of Security Scorecard, and the impact of AI on threat intelligence data. The conversation delves into the transformative impact of AI and Threat Intel on data analysis, product development, and organizational workflows. It explores the exponential growth in interconnectivity and observation data, the value of net flow data when run through models, and the automation of manual tasks in identifying and cross-correlating data sets. The intersection of AI and Threat Intel is redefining the assessment process, transforming workflows, and changing the roles and responsibilities within organizations.

    Takeaways

    • AI security gateways are a hot commodity in the security space.
    • SaaS companies are doing more with less, leveraging AI and automation.
    • AI is changing the way coding is done, reducing the need for human intervention.
    • Security Scorecard was founded to address the growing dependency on supply chain partners and third parties.
    • AI has revolutionized threat intelligence data, uncovering deeper insights and network connections. Exponential growth in interconnectivity and observation data
    • Value of net flow data when run through models
    • Redefining the assessment process and transforming workflows

    Chapters

    • 00:00 AI Security Gateways in the Security Space
    • 07:35 AI's Impact on Coding and Automation
    • 28:44 AI's Impact on Threat Intelligence Data
    • 34:31 Value of Net Flow Data When Run Through Models
    Show More Show Less
    1 hr and 5 mins
  • Episode 28: Cloudflare AI Gateway
    Apr 15 2026

    The video discusses several key topics related to AI and its impact on the tech industry.Firstly, it delves into Anthropic's "Mythos" model and "Project Glasswing." The speaker expresses skepticism about the hyped claims surrounding Mythos, suggesting that the limited release might be due to resource constraints (GPU availability) rather than its groundbreaking capabilities. The speaker draws parallels to Anthropic's past PR strategies, citing the "blackmailed engineer" story as an example of manufactured hype.Secondly, the video addresses the perceived "nerfing" of Anthropic's Claude Code. The speaker details a series of changes, including the introduction of "adaptive thinking," a reduction in default "effort" settings from high to medium, and the removal of visible "thinking" logs from the UI. These changes, while potentially offering cost savings for Anthropic, have led to performance degradation for users, particularly those engaging in complex tasks. The speaker notes that while these changes can be reverted manually, the opt-out nature and the timing of these updates are concerning.Thirdly, the discussion shifts to Cloudflare's AI Gateway. The speaker highlights its features, including virtual gateways with unique hashes for custom rules, compatibility with various SDKs (OpenAI, Anthropic), and logging capabilities. A key aspect is Cloudflare's use of Llama for processing "guardrails," which are implemented for content moderation (e.g., blocking defamation or political content). The speaker also notes the limitations of these guardrails, such as the lack of regex support for sensitive data like API keys, suggesting the gateway is more suited for corporate chatbots than coding environments. The caching, rate limiting, and alias features for API keys are also discussed as beneficial for managing AI access.Finally, the video touches upon the impact of AI on junior engineers. Statistics are presented indicating a decline in "programmer" job postings, contrasting with a smaller drop in "software developer" roles. The speaker suggests a shift from task-based junior roles to more AI-centric orchestration of agents. The speaker predicts a future shortage of software engineers, with companies increasingly needing junior engineers to manage AI systems, thereby elevating the importance of mentorship in AI agent management. The video concludes with a broader discussion on how AI is transforming various careers and the need for educational institutions to adapt their curricula to include AI proficiency. The overall sentiment is that while AI adoption presents challenges, it also creates significant opportunities for those who embrace it.

    Show More Show Less
    1 hr and 4 mins
  • Episode 23: OpenClaw
    Feb 11 2026

    Welcome everybody to Before the Commit episode 23. With me as usual, I have my friend Dustin Hillgartner. This week, we're talking about Open Claw, all things Open Claw. There's really not much more to say other than we hope to break down what it is, some of the risks associated with it, and why it might actually be a good thing.

    Open Claw is an open-source agent framework with potential benefits but significant security risks due to its broad access capabilities. It can integrate with messaging apps and utilizes a "skills" system for instructions. A scan revealed many internet-accessible instances, suggesting users may be unaware of the security implications. Risks include prompt injection attacks and plain-text credential storage. Prominent figures have advised caution.

    By default, Open Claw can expose all granted access. Exploits can involve retrieving credentials through prompt engineering. Its integration with messaging apps widens the attack surface. Key security concerns include lack of scoping, untrusted context sources, maximum privilege by default, and vulnerability to single-point compromises via prompt injection. The project's ease of misconfiguration and adoption by non-technical users exacerbate these issues.

    ModSecOps principles highlight Open Claw's lack of security: skills execute with full permissions, context is untrusted, and it defaults to maximum privilege. Unlike multi-agent systems with adversarial reviews, Open Claw's single-agent design is susceptible to prompt injection attacks. Exploits can bypass safety controls entirely. The analogy of an unquestioning employee with full access to sensitive data aptly describes its risk. Its open-source nature, while fostering development, also allows rapid exploitation, potentially spreading like a worm. Unpatched vulnerabilities and a lack of developer response further compound these dangers.

    Show More Show Less
    1 hr and 4 mins
adbl_web_anon_alc_button_suppression_c
No reviews yet