Menu

Software Architecture and System Design News

Latest curated articles from top engineering blogs

NetflixUberMetaLinkedInSpotifyGitHubAirbnbPinterestSlackDropboxCloudflareStripeDatadogFigmaShopifyAWSGoogle CloudAzureWerner Vogels& 15+ more

134 articles

Cloudflare Blog·9d ago

EmDash: A Serverless, Secure Plugin Architecture Successor to WordPress

EmDash is presented as a modern, serverless alternative to WordPress, addressing critical security and scalability limitations. Its core architectural innovation lies in a sandboxed plugin model using isolated Dynamic Workers, which significantly enhances security and developer flexibility. The system also leverages serverless functions for efficient, scalable hosting with a pay-per-use payment model for content.

MicroservicesSecurity
29419087
Cloudflare Blog·9d ago

Cloudflare's 1.1.1.1 DNS Resolver: Privacy Architecture and Commitments

This article from Cloudflare discusses their ongoing commitment to privacy for the 1.1.1.1 public DNS resolver, highlighting the architectural decisions and operational processes that uphold user data protection. It details independent audits confirming their privacy guarantees, focusing on the anonymization and deletion of IP addresses within 25 hours. The piece emphasizes Cloudflare's technical steps to ensure user privacy, particularly concerning the handling of sensitive DNS query data.

Distributed SystemsSecurity
22115794
The New Stack·9d ago

Security Posture and Supply Chain Risks in AI System Development

This article highlights critical security lapses at Anthropic, including a leaked AI model and exposed source code due to a misconfigured npm package source map. It emphasizes the importance of a holistic security approach that extends beyond just model behavior to encompass release pipelines, infrastructure, and governance to prevent supply chain attacks and intellectual property exposure.

SecurityDevOps & SRE
25115952
The New Stack·9d ago

Securing CI/CD Pipelines: A Critical Shift to Production-Grade Security

This article highlights the escalating threat of supply chain attacks targeting CI/CD pipelines, emphasizing that these systems are the new front line for attackers. It argues that current CI/CD security practices, built on implicit trust and weak controls, are fundamentally flawed. The piece advocates for treating CI/CD environments with the same rigor as production systems, outlining practical architectural and operational changes needed to mitigate these risks.

SecurityDevOps & SRE
18411956
InfoQ Architecture·10d ago

Pinterest's Model Context Protocol Ecosystem for AI Agent Workflows

Pinterest engineered and deployed a Model Context Protocol (MCP) ecosystem to standardize, secure, and scale AI agent workflows, moving from ad-hoc integrations to a unified client-server mechanism. This architecture enables language models to call tools and access structured data across diverse internal systems, significantly boosting developer productivity by automating complex engineering tasks. The design emphasizes domain-specific MCP servers, a central registry for governance, and a human-in-the-loop approval mechanism for sensitive operations.

AI & ML InfrastructureDistributed Systems
1469558
Dev.to #architecture·10d ago

Architectural Implications of AI Agent Code Leaks and Autonomous Execution Risks

This article discusses the architectural and security implications of a significant code leak from Claude Code, an advanced AI coding agent. It highlights how autonomous AI agents, capable of reading, editing, and executing code, introduce new security paradigms and architectural considerations beyond traditional code generation. The leak exposed internal system architecture, execution pipelines, and interaction models with development environments, revealing critical insights into the design of such systems and their associated risks.

AI & ML InfrastructureSecurity
1328847
InfoQ Architecture·11d ago

Understanding Supply Chain Attacks: The LiteLLM Compromise

This article details a supply chain attack on the LiteLLM PyPI package, highlighting vulnerabilities in software distribution channels. It discusses how a compromised package can exfiltrate sensitive data, leading to system halts due to a fork bomb, and the broader implications for dependency management in software architecture.

SecurityDevOps & SRE
936525
Cloudflare Blog·11d ago

Cloudflare's Programmable Flow Protection for Custom DDoS Mitigation

Cloudflare's Programmable Flow Protection allows Magic Transit customers to implement custom DDoS mitigation logic using eBPF programs, specifically targeting UDP-based protocols. This system addresses the limitations of generic DDoS defenses by enabling protocol-aware packet filtering, stateful tracking, and custom challenges at the network edge. It combines customer-specific protocol knowledge with Cloudflare's global network capacity to provide highly effective and tailored protection against sophisticated attacks.

SecurityDistributed Systems
1035917
AWS Architecture Blog·11d ago

Architecting Disaster Recovery on AWS: Data, Compute, and Full Workload Automation

This article outlines a robust approach to disaster recovery (DR) on AWS, detailing how to protect data, compute resources, and entire workloads using native AWS services and partner solutions. It emphasizes cross-Region and cross-account strategies to achieve resilience and business continuity, offering insights into RPO/RTO objectives and automation.

Cloud & InfrastructureSecurity
1006838
InfoQ Architecture·12d ago

Discord's Osprey: A High-Throughput Safety Rules Engine for Real-time Event Processing

Discord open-sourced Osprey, a scalable event stream decisions engine designed for real-time threat detection and mitigation, capable of processing 2.3 million rules per second. Its architecture combines a Rust-based coordinator for high-concurrency event stream management and stateless Python worker nodes for rule evaluation. This polyglot design pattern is key to achieving high throughput and scalability while maintaining developer agility.

Distributed SystemsPerformance & Scaling
1429809
InfoQ Architecture·12d ago

Mitigating Software Supply Chain Attacks: Dependency Confusion and Compromised Builds

This presentation highlights critical vulnerabilities in the modern software supply chain, specifically focusing on dependency confusion and compromised build environments. It demonstrates how seemingly innocuous actions like installing widely used packages can lead to full system access for attackers. The article emphasizes the importance of robust DevSecOps practices, Software Bill of Materials (SBOM), and dependency firewalls to secure software ecosystems against sophisticated supply chain attacks.

SecurityDevOps & SRE
1186814
Dev.to #architecture·12d ago

Implementing Multi-Admin Secure Secret Access with Envelope Encryption

This article delves into the critical system design challenge of securely managing shared secrets among multiple administrators without compromising security or operational efficiency. It highlights the pitfalls of naive approaches and presents envelope encryption as a robust solution. The core of the solution is a two-tier key hierarchy that allows individual admins to unlock a master secret using their unique credentials, decoupling authentication from the master secret's lifecycle.

SecurityDistributed Systems
1296836