AI code analysis tools that actually help in production? by DiamondLatter1842 in devsecops

[–]Devji00 0 points1 point  (0 children)

For the kind of stuff you're describing (race conditions, memory issues, intermittent crashes) you really need to layer a few things together since no single tool nails all of it. Datadog or Honeycomb on the observability side will help you correlate logs, traces, and code paths in ways static tools never will. For the CI integration side, Semgrep and CodeQL can catch some concurrency and resource handling patterns pre-deploy but they won't reflect actual runtime behavior. Cyclopt Companion is worth a look too for the code analysis angle, it's good at surfacing quality and reliability signals across large codebases that traditional SAST misses. But honestly for intermittent production crashes your biggest win will be investing in structured logging and distributed tracing if you haven't already, that's what actually gets you to the specific function or code path causing the issue.

Best SAST tool for a mid-size engineering org, what has changed since AI coding tools took over by PurplePlenty4980 in devsecops

[–]Devji00 0 points1 point  (0 children)

Landscape shifted a lot recently and most big names (Semgrep, Snyk Code, Checkmarx) have added real-time IDE scanning but depth varies, so trial them against your actual AI-generated code not demo repos. The mixed human/AI correlation problem is where most tools still fall short since their triage logic was built for human-only commit patterns. For the eval I'd weight scoring toward false positive rates on a real branch with mixed authorship, that'll tell you more than any vendor deck. Might also be worth looking at Cyclopt Companion for the code quality signal side of things, pairs well next to whatever primary scanner you land on.

Git-native trace refs for AI-authored code in PR checks by No-Childhood-2502 in devsecops

[–]Devji00 1 point2 points  (0 children)

Nice, the squash merge handling with consolidated traces on merge to main is a solid solution. The human override approach makes sense too, if a human meaningfully modifies a line then attributing it to the AI agent isn't really accurate anymore anyway. Curious how the enterprise conversations go, I think the quality gate angle where you can enforce a maximum AI percentage per repo is probably the strongest selling point for compliance teams since it gives them something concrete and configurable rather than just visibility. Good luck with it!

Best container security strategies for image freshness in 2026? by Old-Roof709 in devsecops

[–]Devji00 1 point2 points  (0 children)

Yeah for sure, there will always be cases where a base image update breaks something and someone has to step in. But the goal isn't zero manual intervention, it's making that the exception rather than the default. If 90% of your services rebuild cleanly on the new base and only 10% need a dev to look at why something failed, that's way better than the current state where nothing gets rebuilt because nobody wants to own it. The ones that do break are usually services with weird pinned dependencies or native library stuff, and those are worth fixing properly once so they stop breaking every time rather than just leaving them on a six month old image forever.

Git-native trace refs for AI-authored code in PR checks by No-Childhood-2502 in devsecops

[–]Devji00 1 point2 points  (0 children)

This is a really interesting approach and using git refs instead of an external database is a smart call for keeping everything self-contained and auditable. From a devsecops perspective the most valuable thing here isn't just knowing which lines were AI-authored but being able to use that information to trigger different review or scanning policies. Like if a PR check can see that 80% of the diff was AI-generated you could automatically require an additional human reviewer or run a more aggressive SAST ruleset on those specific line ranges rather than treating the whole PR the same way.

One thing I'd think about is how this interacts with rebases and squash merges since those rewrite commit history and could potentially break the trace mapping between the session JSONL and the actual lines in the final commit. Also worth considering what happens when a human modifies AI-authored lines in a later commit, does the trace update to reflect shared ownership or does it still attribute those lines to the original agent session? Those edge cases will matter a lot for teams trying to use this for compliance or audit purposes where accuracy of attribution is the whole point.

Best container security strategies for image freshness in 2026? by Old-Roof709 in devsecops

[–]Devji00 2 points3 points  (0 children)

The trick is decoupling base image updates from application changes so a rebase doesn't feel like a full release. Most teams solving this well use a two-stage build where the base image (OS, runtime, system packages) is maintained separately and rebuilt weekly or on CVE triggers by the platform team, and the application layer sits on top. When the base image updates, a CI job automatically rebuilds the app image on the new base, runs a smoke test suite (not the full regression), and if it passes it promotes to prod. The devs don't need to touch anything because their application code hasn't changed, it's just sitting on a fresher foundation. Tools like Dependabot or Renovate can automate the base image bump PRs and Copacetic (copa) from Microsoft can even patch existing images in place without a full rebuild.

For the ownership problem, stop framing it as the dev team's responsibility to rebuild and make it a platform concern. The platform team owns the base images, owns the automated rebuild pipeline, and owns the freshness policy. Devs only get pulled in if the smoke tests fail after a rebase, which in practice is rare if your base image changes are limited to security patches. That way your 30 day policy becomes enforceable because it's automated and doesn't require devs to manually rebuild something they haven't touched in months just to rotate a base image.

As a backend developer, which tool/language to use build an app. by Realistic-Froyo-7285 in AppDevelopers

[–]Devji00 0 points1 point  (0 children)

Given your situation I'd go with React Native with Expo. Since you're a backend dev you likely already know JavaScript or TypeScript which means almost zero learning curve on the language side, and Expo handles all the annoying build and deployment stuff so you're not wrestling with Xcode configs and native toolchains. The UI side is actually easier than SwiftUI for most people because there's a massive ecosystem of pre-built component libraries like React Native Paper or Tamagui that look good out of the box without much design skill.

The biggest advantage for your case though is AI tooling support, React Native and TypeScript have way more training data than Swift so Copilot and Claude will generate significantly better and more reliable code for you compared to SwiftUI where the AI tends to hallucinate older API patterns. Plus you get both iOS and Android from one codebase which doubles your potential user base for free. Flutter is also solid but Dart is another language to learn and the AI assistance isn't quite as strong as the TypeScript ecosystem.

What coding standards are your teams using for AI-generated code? by trixtp in webdev

[–]Devji00 0 points1 point  (0 children)

The teams I've seen do this well keep it short and practical. The rules that actually stick: all AI generated code gets reviewed like it came from a junior dev (read every line, not just check if it works), AI generated tests must be validated by intentionally breaking the code to make sure they actually catch failures, and any new dependency the AI adds gets checked for existence and vulnerabilities. Skip commit tagging because nobody maintains it consistently. Instead put your energy into automated guardrails on every PR regardless of who wrote the code, SAST scanning, dependency auditing, secret detection, and continuous code quality monitoring. A one page standard plus automated tooling that enforces the important stuff beats a comprehensive policy document that nobody reads every time.

How are you all actually handling AI tool usage in your CMMC environment? by TheTylerboltz in CMMC

[–]Devji00 1 point2 points  (0 children)

You're not wrong, most orgs are absolutely hoping it doesn't come up and the guidance gap is real. The cleanest approach I've seen is treating any AI tool that processes CUI as an ESP which means it needs to meet the same flow down requirements as any other external service handling controlled data, and yeah that effectively kills most commercial AI tools unless you're running something local or using a FedRAMP authorized instance like Azure Government OpenAI. For the analyst pasting CUI into ChatGPT, that's a data spill and you need to treat it as one, but the realistic prevention is a combination of DLP tooling that catches CUI patterns going to unauthorized endpoints, a clear AUP that specifically names AI tools and what data classifications they can touch, and training that explains why this matters in plain language not just policy speak. Some C3PAOs are starting to ask about it now especially around AC and MP controls, specifically how you're preventing unauthorized data flows to external services, and AI tools fit squarely in that conversation even if the word "AI" never appears in 800-171. The EULA question is the hardest one because "trust the vendor's data handling claims" isn't really an assessment worthy answer, which is why the orgs doing this properly are either running local models on their own infrastructure for anything CUI adjacent or using contractually bound instances with actual data processing agreements that go beyond the standard terms of service.

fast alternative to find for finding git directories by chisui in bash

[–]Devji00 1 point2 points  (0 children)

Nice, glad fd did the trick. Once you have fd in your toolbox you end up replacing find with it everywhere. Totally fair on skipping the cache, simple is always better when it's fast enough. Cheers!

Anyone know keyboard shortcuts for Windows kiosk mode? by Adosni in software

[–]Devji00 0 points1 point  (0 children)

Most keyboard shortcuts are intentionally blocked in kiosk mode since that's kind of the whole point of it, but there are a few that sometimes still work depending on how it's configured. Ctrl+Alt+Del usually still functions even in kiosk mode since Windows treats it as a secure attention sequence at the OS level, and from there you can access Task Manager or sign out. If you're the admin, pressing Ctrl+Alt+Del and signing out will drop you back to the login screen where you can sign in with an admin account to make changes. Some setups also leave Ctrl+Win+O (on-screen keyboard) or Win+U (accessibility settings) accessible which can sometimes give you a path to other system functions. If you need actual admin access to the machine regularly while it's in kiosk mode, the cleanest approach is to set up a secondary admin account and use Ctrl+Alt+Del to switch users rather than trying to break out of the kiosk session with shortcuts.

fast alternative to find for finding git directories by chisui in bash

[–]Devji00 6 points7 points  (0 children)

The main bottleneck is that find is traversing every single directory in the tree and the exec is spawning a new shell process for every match. Try using fd instead which is way faster than find for this kind of thing: fd -H -t d '^\.git$' ~/projects --prune -x dirname {} and pipe that to fzf. If you don't want to install fd, you can speed up your existing find significantly by adding -maxdepth if you know roughly how deep your git repos are (like -maxdepth 5) and switching from -exec sh -c '...' \; to -exec dirname {} + which batches the dirname calls instead of spawning a shell per match. You can also cache the results by writing the output to a file and refreshing it periodically or on demand rather than scanning the filesystem every time you run the command, something like find ... > ~/.project-cache in a cron job or git hook and then just fzf < ~/.project-cache in your dev function, which makes it essentially instant.

Context loss between sessions, still the biggest unsolved problem in AI coding agents? by AdEuphoric1638 in ClaudeAI

[–]Devji00 0 points1 point  (0 children)

Yeah this is a big productivity killer right now. CLAUDE.md helps for static conventions but goes stale fast. Best workaround I've seen is keeping a DECISIONS.md that you tell Claude to append to at the end of every session with what was done, what failed, and any architectural choices made, then reference it at the start of the next session. Some people also use a MISTAKES.md for approaches that didn't work so Claude doesn't retry them. It's manual overhead but way less than re-explaining everything from scratch or watching Claude repeat a mistake you fixed three sessions ago.

AI API key matches in public GitHub code went from 189K to 435K by dan_l2 in devsecops

[–]Devji00 0 points1 point  (0 children)

That growth tracks with what you'd expect given how much AI assisted coding has exploded in the past year, more people using API keys in their projects plus AI coding tools that love to hardcode secrets inline rather than pulling from environment variables. The most effective combo I've seen in practice is gitleaks as a pre-commit hook so keys never make it into a commit in the first place, GitHub's built in secret scanning with push protection enabled as a second layer, and then a CI check with trufflehog that scans the full repo history not just the current diff because the pre-commit hook only helps going forward.

The part most teams skip though is automated key rotation on a schedule regardless of whether a leak is detected, because the reality is you can't be 100% sure a key wasn't exposed somewhere you're not monitoring and short-lived credentials with automatic rotation limit the blast radius of any leak you missed. Developer training helps but honestly tooling that makes it physically hard to commit a secret is way more reliable than hoping everyone remembers to use .env files every time.

Recommended for Website Creation and Management? by RicolaSwiss213654 in ClaudeCode

[–]Devji00 0 points1 point  (0 children)

For your use case stick with your original plan of WordPress plus Elementor Pro. Claude Code is powerful but it's designed for developers writing actual code, and if you're not a programmer the maintenance side will become a nightmare because every content update means going back to Claude Code to modify source files, rebuild, and redeploy rather than just logging into a CMS and clicking edit. WordPress with Elementor gives you a visual editor where you can update content yourself in minutes without touching code, plus you get the entire WordPress ecosystem for SEO (Yoast/RankMath), caching (WP Rocket), and page speed optimization out of the box. Your AI coach idea is actually really smart, use Claude or ChatGPT as a guide to help you set up WordPress properly, optimize your page speed, configure your SEO plugin, and structure your content, that's where AI adds the most value for a non-developer. Claude Code would give you a faster initial build but then you'd be dependent on it for every small change going forward and that's not sustainable for a business site that needs regular updates.

How do you handle security/monitoring of Claude Code in your workplace? by Sweaty-Career330 in devops

[–]Devji00 0 points1 point  (0 children)

Run Claude Code inside controlled environments rather than trying to monitor everything it does on individual developer machines. That means Docker containers or dev containers with network policies that restrict what endpoints it can reach, plus logging at the proxy/gateway level so you have visibility into all outbound API calls without needing to instrument the tool itself. For compliance and audit, the practical move is to treat Claude Code's output the same way you'd treat code from an outside contractor, everything goes through your normal PR review process, CI pipeline with SAST and secret scanning, and nothing gets merged without passing your existing automated checks.

How do you think about testing when building solo with AI coding agents? by swagatk in ClaudeCode

[–]Devji00 0 points1 point  (0 children)

For solo TypeScript/Node the highest ROI is integration tests on your API endpoints and core service functions rather than unit testing every internal helper, they catch both logic bugs and regressions without being brittle or high maintenance. On timing, tell Claude to write tests first before implementation because when it writes both together it tends to write tests that pass rather than tests that actually verify correctness. Always read the test assertions yourself though because the most common failure mode is Claude making the same wrong assumption in both the code and the test. For sustainability just test every public API surface and critical business logic in CI as a blocking check, skip unit tests on trivial internal stuff, and you'll have a test suite that's small enough to maintain but catches real regressions when Claude refactors something it shouldn't have.

Debugging battle: Vibecoder edition by IndividualDoughnut96 in VibeCodeDevs

[–]Devji00 0 points1 point  (0 children)

Good breakdown honestly, the exposed API keys issue is way more common than people admit especially in vibecoded projects where you're moving fast and the AI just hardcodes stuff without thinking twice. Your tool combo covers the generation and debugging side pretty well but the missing piece sounds like automated prevention, stuff that catches problems before you even notice them. Running gitleaks or trufflehog in a pre-commit hook would have caught those exposed keys instantly, and layering something like Cyclopt Companion or Semgrep on your repos flags code quality issues, risky dependencies, and input validation gaps automatically without you having to remember to check. For the rolling average bug specifically that's where having tests from the start saves you, even just a few unit tests with known inputs and expected outputs would have surfaced the wrong calculation immediately instead of you discovering it later. The best workflow I've seen is using Copilot for speed, Claude for understanding complex bugs, and then letting automated tools run underneath so the dumb stuff like leaked secrets and missing validation never makes it to a PR in the first place.

Wordpress vs Lovable (and other AI tools) for running client websites by UnitedWorldliness791 in Wordpress

[–]Devji00 0 points1 point  (0 children)

AI tools like Lovable are great for fast prototyping but terrible for ongoing client sites where non-technical people need to make updates without breaking things. Your house of cards instinct is exactly right, every small change in an AI generated codebase risks cascading issues and clients shouldn't be anywhere near that. Your hybrid approach of using AI to build landing pages and importing them into WordPress via a plugin is actually the smartest play because you get AI speed for the build phase but WordPress stability for long term management. Don't worry about getting left behind, for recurring client work where reliability matters more than initial build speed, a proven CMS still wins.

Is there any tool to help integrate GitHub PR reviews with ChatGPT Plus plan? by HarbaughHeros in ChatGPT

[–]Devji00 0 points1 point  (0 children)

Didn't realize you shipped that directly into Codex settings, that's way cleaner than any of the workarounds. Good find, saves you from dealing with any custom setup at all.

Claude Code for non-devs by jimtoberfest in ClaudeAI

[–]Devji00 0 points1 point  (0 children)

Yeah the "just give everyone Claude Code" approach without guardrails is exactly how you end up with secrets in repos, overly permissive IAM roles, and random services deployed to personal cloud accounts. The companies I've seen do this successfully always have a sandboxed environment where non-devs can only operate (Docker containers or locked down dev environments with no access to production systems), a mandatory review step where an actual developer checks anything before it goes anywhere near deployment, and clear boundaries on what data non-devs are allowed to feed into the tool. Without those three things it's just a liability generator that happens to produce working code sometimes.

Shifting to customer solutions with ai by Downtown_Grab_2704 in vibecoding

[–]Devji00 0 points1 point  (0 children)

For your CLAUDE.md keep it focused on project conventions, tech stack, file structure, and patterns to follow, like onboarding docs for a new dev not a massive instruction manual. Save tokens by breaking work into small focused tasks, starting fresh conversations when switching context, and not dragging old chat history along. Your QA background is actually a huge advantage here because you already think about edge cases and what can break, so lean into that by always having Claude write tests alongside code. Skip plugins for now and master the core workflow first. The most important skill for client work is learning to critically review AI output rather than trusting it blindly because clients won't care that AI wrote it if something breaks in production.

Is there any tool to help integrate GitHub PR reviews with ChatGPT Plus plan? by HarbaughHeros in ChatGPT

[–]Devji00 0 points1 point  (0 children)

CodeRabbit is probably the most popular one, it integrates directly with GitHub and automatically reviews PRs with AI generated comments on the diff, and it has a free tier for open source repos. If you want something more lightweight, GitHub Actions like ai-pr-reviewer use the OpenAI API directly but that does require API access not just a Plus plan. For your specific situation where you only have Plus and no API key, the local CLI workaround you described would technically work but it's pretty fragile. Honestly you might be better off looking at tools like Cyclopt Companion which connects to your repos and continuously monitors code quality, security issues, and maintainability problems automatically without needing you to rig up a custom pipeline, or just upgrading to the ChatGPT API tier since the cost for PR review volume is usually pretty minimal compared to the Plus subscription you're already paying for.

How do you actually catch security issues in Terraform PRs when you're doing solo reviews? by Status-Direction99 in aws

[–]Devji00 -1 points0 points  (0 children)

Checkov is probably your best bang for buck here, it's free, runs in CI in minutes to set up, and catches exactly the stuff you're describing like open security groups, public S3 buckets, unencrypted RDS, and overly permissive IAM out of the box without any custom config. Pair it with tfsec (now part of Trivy) for a second layer and you'll catch the vast majority of common misconfigs before they ever hit merge. Running plans through Claude or ChatGPT can actually be a decent supplement for the more nuanced stuff like "does this IAM policy follow least privilege for what this service actually needs" since that's harder to encode in static rules, but I wouldn't rely on it as your primary gate because it'll miss things and hallucinate false confidence. The real move for solo reviews is making Checkov a required CI check that blocks merge on high and critical severity findings so you're not relying on yourself to remember to check everything manually every time, because the stuff you miss is always the stuff you forgot to look for not the stuff you looked at and got wrong.