Skip to content

Instantly share code, notes, and snippets.

@gideonaina
gideonaina / v1
Created March 19, 2026 17:19
v1 advantage
This technical documentation introduces the v1 Azure OpenAI API, which streamlines how developers integrate AI models by removing the requirement for frequent manual version updates. The new interface simplifies the transition between OpenAI and Azure environments by supporting standard clients and enabling automatic token refreshes. Beyond internal models, the API now facilitates calls to third-party providers like DeepSeek and Grok through a unified syntax. The guide also details the evolution of the platform, outlining a changelog of features such as reasoning models, structured outputs, and expanded tool integrations. Developers can find specific code examples across multiple programming languages to help them implement these updated authentication and configuration methods. Consistent with Microsoft’s Foundry Models initiative, this update focuses on increasing flexibility and reducing the technical overhead of maintaining enterprise AI applications.
Upgrading to the v1 Azure OpenAI API, which becomes a
@gideonaina
gideonaina / nono-hack.md
Last active March 13, 2026 15:05
Some learnings from hacking nono

Fundamental

At a high level, nono works by creating a temporary OS-level sandbox around a process and enforcing allow/deny rules for filesystem, network, and execution. Everything is default-deny, and only what you explicitly allow is permitted.

The important part: the blocking happens below your program, not inside Python or your agent code.

Example

When you run:

nono run --allow-cwd -- python3 my_agent.py

from pyrit.common import IN_MEMORY, initialize_pyrit
from pyrit.orchestrator import PromptSendingOrchestrator
from pyrit.prompt_target.http_target.http_target import (
HTTPTarget,
)
from pyrit.prompt_target import (
get_http_target_json_response_callback_function,
get_http_target_regex_matching_callback_function,
)
@gideonaina
gideonaina / kes.md
Last active August 12, 2025 11:07
Knowledge Extraction System

Knowledge Extraction System - A Template for Security Architect's Workflow Augmentation Leveraging LLM.

1.0: Problem Statement.

In the most basic sense, LLMs are a useful piece of technology for encoding information. Trained on vast datasets to understand and generate human-like text, they excel in extracting and synthesizing knowledge from diverse sources, making them powerful for information retrieval. They are a useful tool for augmenting day-to-day tasks or workflows when used right. However, LLMs can struggle with providing precise and relevant information within user prompts due to potential biases, overfitting, and lack of specific context. Privacy concerns arise as LLMs may inadvertently retain and expose sensitive data from their training sets, risking user confidentiality and data security. When organizations use third-party LLM API, there is also a risk of providing proprietary information to the model that can later be leaked.

While LLMs offer broad applicability across domains, their adopt

@gideonaina
gideonaina / DS&Algo.md
Last active August 30, 2022 00:38
Computer Science Basics

Table of contents

PART 1 - Algorithms

1.1 Sorting Algorithms

1.1.1 [Sorting Algorithm Stability](#sortingAlgorithmStability)

1.1.2 [Groups of Sorting Algorithm by Time complexity](#groupsOfsortingAlgorithm)
#!/bin/bash
# assign variables
ACTION=${1}
function create_file() {
touch "${1}-54321"
}