Blog

Why 'We'll Add Auth Later' Breaks Regulated Systems

Treating authentication as a feature to be added after the MVP creates architectural debt that cannot be paid without rewriting the system. For regulated environments, auth is not a feature. It is the foundation.

Artifact Registries Are Now Part of the Attack Surface

Container registries and artifact repositories have evolved from passive storage to active components of the software supply chain. This makes them targets for poisoning, substitution, and dependency confusion attacks.

Container Supply Chains and EU Sovereignty Under the CRA

The CRA makes third-country supply chain risk a binding legal obligation and classifies container runtimes as Class II products. This has architectural consequences for how organisations source and distribute container images.