|
Security engineer at Bird — cloud infrastructure, Kubernetes, application security, and supply chain. After hours: building tools, poking at AI security, and mass producing Go binaries that may or may not work. |
focus:
- LLM threat modeling
- prompt injection research
- securing agentic systems
- adversarial AI defense
status: caffeinated
oncall: probably
dns: broken (as always) |
> objdump -d philip | less
package philip
import (
"context"
"time"
)
type SecurityEngineer interface {
Harden(ctx context.Context, infra *CloudInfrastructure) error
ThreatModel(system System) []ThreatVector
BreakAndFix(target AttackSurface) ([]Finding, []Patch)
Review(code []byte) (approved bool, findings []Issue)
Respond(incident Incident) PostMortem
Ship()
}
type philip struct {
role string
focus []string
current []string
coffee int
}
func NewPhilip() SecurityEngineer {
return &philip{
role: "Security Engineer",
focus: []string{"cloud security", "appsec", "k8s", "supply chain"},
current: []string{"AI security", "LLM threat modeling", "agentic system hardening"},
coffee: 0xFFFF,
}
}
func (p *philip) Respond(incident Incident) PostMortem {
if incident.Severity == "critical" && time.Now().Weekday() == time.Friday {
panic("not today")
}
return PostMortem{RootCause: "DNS. it's always DNS."}
}
func (p *philip) Ship() { go p.Ship() }


