← CodeClarityLab Home
Browse by Category
+ added · updated 7d
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Memory Pressure Detection PHP 7.0+
Proactively identifying when a PHP process approaches its memory limit so corrective action can be taken before a fatal error.
1d ago performance intermediate
Database Query Result Streaming PHP 8.0+
Processing large result sets row-by-row without loading the entire dataset into memory - essential for PHP CLI scripts handling millions of rows.
4d ago database intermediate
Error Recovery Patterns
Design strategies for gracefully handling failures and restoring system functionality without data loss or user disruption.
5d ago general intermediate
Client-Side Template Injection (CSTI)
Attacker-controlled input rendered as a template expression by a client-side framework (AngularJS, Vue, Handlebars), executing JavaScript in the victim's browser.
CWE-1336 OWASP A3:2021
1w ago security advanced 7.5
Constitutional AI (CAI)
Anthropic's training methodology where models critique and revise their own outputs against a set of written principles, reducing reliance on human labellers for alignment.
1w ago ai_ml advanced
CSS Injection & Data Exfiltration via Stylesheets
Attacker-controlled CSS injected into a page or stylesheet that exfiltrates data via attribute selectors and `url()` callbacks, defaces UI, or enables phishing — all without a single line of JavaScript.
CWE-79 OWASP A3:2021
1w ago security advanced 6.5
DOM Clobbering
Attack where injected HTML elements with controlled `id` or `name` attributes overwrite JavaScript globals or document properties, weaponising script-less HTML injection into code execution.
CWE-79 OWASP A3:2021
1w ago security advanced 6.5
Mixture of Experts (MoE)
Neural network architecture where a gating network routes each token to a small subset of specialist 'expert' sub-networks, enabling huge total parameter counts at moderate per-token compute cost.
1w ago ai_ml advanced
NoSQL Injection PHP 5.4+
Attacker-controlled input embedded into NoSQL queries (MongoDB, Redis, Couchbase) that subverts query intent — bypassing auth, exfiltrating data, or executing server-side code.
CWE-943 OWASP A3:2021
1w ago security intermediate 8.8
Prompt Caching
API feature where a static prompt prefix (system instructions, large context) is cached server-side, dramatically reducing cost and latency on repeated calls that share the prefix.
1w ago ai_ml intermediate
Reasoning Models & Test-Time Compute
A class of LLMs trained to allocate extra inference-time compute to internal reasoning before answering, achieving large gains on math, code, and logic at the cost of latency and tokens.
1w ago ai_ml intermediate
RLHF — Reinforcement Learning from Human Feedback
Post-training method where human preference rankings train a reward model that fine-tunes an LLM via reinforcement learning, aligning outputs with human preferences.
1w ago ai_ml advanced
Server-Side Includes (SSI) Injection
Attacker-controlled SSI directives (`<!--#exec ... -->`) injected into pages parsed by Apache or another SSI-enabled server, achieving file disclosure or remote command execution.
CWE-97 OWASP A3:2021
1w ago security intermediate 9.8
cgroups — Linux Control Groups
A Linux kernel feature that groups processes and meters or limits their access to CPU, memory, I/O, network, and other resources — the core primitive that makes Docker, systemd, and Kubernetes resource limits possible.
3w ago linux advanced
Diffusion Models
A class of generative models that learn to reverse a gradual noising process — starting from pure noise and iteratively denoising into coherent images, audio or video; the core technique behind Stable Diffusion, Midjourney and DALL·E 3.
3w ago ai_ml advanced
Internal Developer Platform (IDP)
A curated, self-service layer on top of cloud and CI/CD infrastructure that product teams use to ship services without filing tickets — paved roads that make the right thing the easy thing.
3w ago devops intermediate
Load Balancer Types — L4 vs L7
Layer-4 load balancers forward raw TCP/UDP packets based on IP and port; layer-7 load balancers terminate HTTP and route based on paths, headers and cookies — different trade-offs for different traffic.
3w ago cloud intermediate
Shadow DOM
A browser feature that attaches a scoped, encapsulated DOM subtree to an element — styles and IDs inside the shadow tree do not leak in or out, enabling true component isolation on the web.
3w ago frontend intermediate
Software Composition Analysis (SCA)
The practice and tooling for identifying all open-source and third-party components in a codebase, detecting known vulnerabilities (CVEs) in them, and flagging licence risks — distinct from static analysis of your own code.
3w ago security intermediate
Technical Writing for Developers
The craft of writing documentation, READMEs, design docs, RFCs, and comments clearly enough that another engineer can act on them without asking you — a force multiplier that most developers undertrain.
3w ago general beginner
✓ schema.org compliant