Arang.dev

📝 Posts

Tech blog post collection

Does `AGENTS.md` Actually Help Coding Agents? — ETH Zürich Paper Analysis

Does `AGENTS.md` Actually Help Coding Agents? — ETH Zürich Paper Analysis

A summary of the ETH Zürich paper that empirically analyzes the impact of context files such as `AGENTS.md` and `CLAUDE.md` on the performance of coding agents, along with practical implications.

#AI#Coding Agent#AGENTS.md
In-Depth Analysis of OpenClaw 1-Click RCE Vulnerability (CVE-2026-25253): Achieving Root Privilege with a Single Click

In-Depth Analysis of OpenClaw 1-Click RCE Vulnerability (CVE-2026-25253): Achieving Root Privilege with a Single Click

Analyzing the recently disclosed critical vulnerability CVE-2026-25253 in OpenClaw (formerly Moltbot). We delve into the details of the 1-Click RCE exploit chain that combines authentication token leakage and WebSocket hijacking.

#OpenClaw#CVE-2026-25253#RCE
Claude's C Compiler (CCC) vs GCC Performance Benchmark: The Current State of AI Coding

Claude's C Compiler (CCC) vs GCC Performance Benchmark: The Current State of AI Coding

A comparative analysis of the performance of the C compiler (CCC) written by Anthropic's Claude Opus 4.6 and GCC. We explore the possibilities and limitations of AI-created compilers through the success of Linux kernel compilation and SQLite benchmark results.

#Claude#CCC#GCC
500 Zero-Days Discovered in Claude Opus 4.6: A New Era of AI Security Research

500 Zero-Days Discovered in Claude Opus 4.6: A New Era of AI Security Research

Anthropic's latest AI model, Claude Opus 4.6, discovered over 500 zero-day vulnerabilities in open-source projects. This article analyzes how AI found vulnerabilities like a security researcher and the impact this has on the security industry.

#AI#Security#Claude
Moltbook API Race Condition Vulnerability Analysis

Moltbook API Race Condition Vulnerability Analysis

A technical analysis of the Race Condition vulnerability and its impact, discovered in the voting system of Moltbook, an AI agent social network.

#Security#Race Condition#API
OpenClaw Antigravity OAuth Error Troubleshooting - Bypassing the Version Check

OpenClaw Antigravity OAuth Error Troubleshooting - Bypassing the Version Check

A solution for the 'This version of Antigravity is no longer supported' error when using Google Antigravity in OpenClaw. This post outlines how to bypass the version check via a User-Agent patch.

#OpenClaw#Antigravity#트러블슈팅
OpenClaw Discord Emoji Skill Dev Log - Implementing User Approval Workflow

OpenClaw Discord Emoji Skill Dev Log - Implementing User Approval Workflow

My experience developing a skill for OpenClaw AI agents that detects Discord emoji reactions to facilitate user decision-making, and uploading it to GitHub. Includes issues faced during ClawdHub deployment and their solutions.

#OpenClaw#Discord#AI Agent
Creating a Self-Evolving AI Agent with OpenClaw - AlphaHunter Development Story

Creating a Self-Evolving AI Agent with OpenClaw - AlphaHunter Development Story

An experience building a system where the OpenClaw AI agent develops ideas on its own, tracks tasks with TODO.md, and receives user approval via Discord emojis. A new development pattern for collaborating with AI.

#OpenClaw#AI Agent#자동화
Building a Tech Blog with AI Pair Programming (Antigravity + MCP)

Building a Tech Blog with AI Pair Programming (Antigravity + MCP)

A chronicle of building a Next.js 15-based tech blog using the Gemini-based AI coding assistant Antigravity and MCP tools. Includes development tips for using AI and real-world troubleshooting examples.

#AI#Antigravity#MCP
Fixing Fiddler HTTPS Certificate Errors

Fixing Fiddler HTTPS Certificate Errors

How to resolve certificate errors that occur when capturing HTTPS traffic in Fiddler.

#fiddler#https#certificate
JSP commons-fileupload WAF Bypass

JSP commons-fileupload WAF Bypass

Exploring the JSP commons-fileupload WAF filtering bypass technique through the CCE2019 ENKI challenge

#web-security#waf-bypass#file-upload
CSP Bypass Techniques

CSP Bypass Techniques

A summary of various techniques to bypass Content Security Policy

#web-security#csp#bypass
XSS Bypass WAF & Filtering Techniques

XSS Bypass WAF & Filtering Techniques

WAF and filtering bypass techniques derived from XSS vulnerability analysis during penetration testing and bug bounties.

#web-security#xss#bypass
Summary of SQL Injection Bypass Techniques

Summary of SQL Injection Bypass Techniques

A collection of SQL Injection bypass techniques learned while solving web hacking wargames.

#web-security#sql-injection#bypass
Posts | Arang