AI Engineering That Ships

Hard-won insights from assembly language to multi-agent orchestration.

Written for engineers who care how systems actually behave in production.

Agentic infrastructure · Defense-in-depth security · Modernizing legacy systems

Featured Articles

AI Security

Securing Agentic AI Systems: What Two Rounds of Adversarial Testing Taught Us

Securing Agentic AI Systems: What Two Rounds of Adversarial Testing Taught Us 27 attacks. 14 defense patches. 550 lines of security hardening. Two rounds proved the same thing from opposite directions: targeted patches drop the attack success rate from 65% to 20% against known vectors. Structural weaknesses keep it at 85.7% for new ones. Patching and architecture are complements, not substitutes. Figure 1 - The Two-Round Journey: From 65% CRITICAL to 47% HIGH, but the headline obscures the real story. Regression ASR (20%) proves patches work. Escalation ASR (85.7%) proves architecture doesn't. The gap between these two numbers is the gap…

Read article
Securing Agentic AI Systems: What Two Rounds of Adversarial Testing Taught Us

The Dotzlaw Team

Two skilled engineers building advanced agentic AI projects and research alongside me. They contribute directly to the systems, articles, and tools published on this site.

Latest Insights

View all →
Securing Agentic AI Systems: What Two Rounds of Adversarial Testing Taught Us AI Security

Securing Agentic AI Systems: What Two Rounds of Adversarial Testing Taught Us

Part 4 of 4 Adversarial Agent Testing

27 attacks across 2 rounds, 14 defense patches, 550 lines of security hardening. The transferable lesson: patching fixes yesterday's attacks, architecture survives tomorrow's. Here is what we learned about building, testing, and defending agentic AI applications.

2026-03-10 Read Article →
The Escalation Wave: Why Patches Work but Architecture Doesn't AI Security

The Escalation Wave: Why Patches Work but Architecture Doesn't

Part 3 of 4 Adversarial Agent Testing

Round 2 re-ran all 10 original attacks against patched code -- 8 were blocked (20% ASR). Then 7 new attacks hit structural weaknesses: Unicode zero-width characters bypassed every regex, 5 rapid requests crashed the server, and a pattern gap between security layers let 11 injection techniques through. Escalation ASR: 85.7%.

2026-03-10 Read Article →
65% Attack Success Rate Against an Unpatched Target AI Security

65% Attack Success Rate Against an Unpatched Target

Part 2 of 4 Adversarial Agent Testing

Round 1 of our adversarial exercise: 10 attacks in 5 minutes, 7 confirmed vulnerabilities, one critical credential exfiltration. The Red Team read our API keys through a base64-encoded path that nobody thought to validate. Blue Team detected everything -- but the damage was already done.

2026-03-10 Read Article →
Adversarial Agent Testing: When Your AI Agents Attack Each Other AI Security

Adversarial Agent Testing: When Your AI Agents Attack Each Other

Part 1 of 4 Adversarial Agent Testing

We built a platform where five Claude Code agents operate as Red Team attackers, Blue Team defenders, and an impartial Referee -- then pointed them at a real target. The first exercise found 7 confirmed vulnerabilities in 5 minutes. The second proved that patches work but architecture doesn't.

2026-03-10 Read Article →
WordPress to Astro: Migrating a Production Site with AI-Assisted Infrastructure Claude Code

WordPress to Astro: Migrating a Production Site with AI-Assisted Infrastructure

Part 4 of 4 Building the Bootstrap Framework

41 WordPress articles, 187 images, a design-matched dark theme, and a Projects section -- all extracted from a SQL backup file and rebuilt in Astro. This is the story of migrating dotzlaw.com from WordPress to a modern static site, and what the Bootstrap Framework actually contributed.

2026-02-27 Read Article →
Securing Agentic AI: How We Found 11 Security Gaps in Our Own Framework and Built Defense-in-Depth to Close Them AI Security

Securing Agentic AI: How We Found 11 Security Gaps in Our Own Framework and Built Defense-in-Depth to Close Them

Part 3 of 4 Building the Bootstrap Framework

We built a framework with 18 skills and 11 hooks. A security audit found 11 gaps. We closed all of them with 6 new hooks, 2 JSON schemas, a 3-tier trajectory monitoring system, and per-archetype security patterns across 7 project types.

2026-02-26 Read Article →
From Prototype to Platform: How a Framework Learned to Improve Itself Claude Code

From Prototype to Platform: How a Framework Learned to Improve Itself

Part 2 of 4 Building the Bootstrap Framework

After two production migrations, we turned the framework on itself. A systematic gap analysis identified 8 missing capabilities. Round 1 added 3 of them, expanding the pipeline from 7 to 10 steps. An independent review graded the work A-. The compound returns operate not just project-to-project but within the framework itself.

2026-02-25 Read Article →
An Agent Swarm That Builds Agent Swarms: How We Used Claude Code to Generate Claude Code Infrastructure Claude Code

An Agent Swarm That Builds Agent Swarms: How We Used Claude Code to Generate Claude Code Infrastructure

Part 1 of 4 Building the Bootstrap Framework

We built a framework where Claude Code agents analyze an existing codebase, generate tailored agent teams, hooks, and skills. Two migrations later -- the second harder but faster -- the compound returns are real.

2026-02-11 Read Article →
Claude Code Security: Building Defense-in-Depth with Five Primitives Claude Code

Claude Code Security: Building Defense-in-Depth with Five Primitives

Part 6 of 6 Claude Code

Most Claude Code projects ship with zero security infrastructure. The same 5 building blocks you use for capability -- hooks, agents, skills, commands, and teams -- become a comprehensive defense-in-depth architecture when configured for security.

2026-01-27 Read Article →

Production Projects

View All →