RivasSec

Infrastructure. Security. Insight.

Field notes on infrastructure security, cloud hardening, Kubernetes, IAM, and OSINT by RivasSec.

Latest posts

Adoption Is a Security Control: Notes from Paving a Road

A security control developers can route around is not a control. Field notes from rebuilding a cloud security model around making the secure path the easy path: 40% lower remediation time, 27% lower pipeline latency, and a four-month adoption stall I caused myself.


Continue reading

The Teensy That Failed in Public: An EFI Brute Force, Hours Late

In 2013, Hackaday wrote that my MacBook EFI brute force was unsuccessful. Hours after the article shipped, it worked. Three rate-limiting defenses, each leaking information at a different observable seam — the same pattern that shows up daily in modern cloud security architectures. A reread of the project that survived me, plus the invariant that ports cleanly into 2026 work.


Continue reading

IAM Roles That Fail Loud: Small Defaults, Big Difference

A small Pulumi library that treats IAM safety as a precondition: mandatory permissions boundary, no wildcard trust, no wildcard actions, every opt-out explicit.


Continue reading

The Trust Decay: Why Modern Hiring Has Become an Adversarial System

The tech hiring pipeline has shifted from talent discovery to risk mitigation. In 2026, the engineers who get hired are the ones who are hardest to doubt.


Continue reading

Never Lose Connection: Multi-Phone Bluetooth Tethering for Pwnagotchi

bt-tether-multi is a Pwnagotchi plugin for intelligent multi-phone Bluetooth tethering with automatic WAN failover and silent-disconnect recovery in the field.


Continue reading

Elasticsearch Snapshot Verification, Minimal Privileges

Verify Elasticsearch snapshots without manage_snapshot: minimal API key, Prometheus-friendly script, and a public tools repo for hardened monitoring automation.


Continue reading

Hardening Kubernetes Deployments

Pod-level Kubernetes guardrails aligned with the Pod Security Standards Restricted profile: non-root, no caps, read-only FS, NetworkPolicies, SA hardening.


Continue reading

Taming the OOM Killer: Process Priorities on Linux

The Linux OOM Killer decides what dies under memory pressure. Protect sshd, mysqld, and other critical processes with oom_score_adj via a small script.


Continue reading

Catching a Nation-State Proxy: OSINT on Twitter

In 2012 I traced a state-aligned Twitter proxy tied to Venezuela's ruling party. OSINT lessons for spotting subtle, credential-phishing nation-state infra.


Continue reading

The 208.5-Day Kernel Bug: Uptime, Overflow, and Risk

A 2012 Linux kernel bug caused CPU lockups after 208.5 days of uptime due to an integer overflow in sched_clock(). RHEL 5/6 lesson: patch and observe uptime.


Continue reading