Michael Moreira (@_michaelmoreira) 's Twitter Profile
Michael Moreira

@_michaelmoreira

DevOps Engineer on a mission to make developers' lives easier ☁️🚀 #DevOps #Cloud #Automation #buildinpublic #Saas #indiehackers

ID: 866436059797872641

calendar_today21-05-2017 23:30:29

24 Tweet

71 Takipçi

506 Takip Edilen

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

The axios compromise hit devs with no pipeline visibility. TruffleHog would've caught the secrets. SBOM would've flagged the package. Pinned Actions would've blocked the Trivy pivot. FlowEasy runs 6 scans on every deploy. Zero config. floweasy.dev #DevSecOps #CICD

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

Claude Code just shipped 500K char MCP results. Before: large logs or DB schemas got truncated. After: full context, no chunking hacks. Changes how the FlowEasy MCP server works — now `analyze` returns full logs. What MCP tools hit size limits for you? #ClaudeCode #MCP

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

Claude Code April 2026 — 4 useful updates: /powerup → demos inside terminal defer in PreToolUse → pause agents for CI/CD approvals /cost → see spend per model @mention subagents → route to named agents Write tool also 60% faster. What are you using? #ClaudeCode #AIDev

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

Datadog DevSecOps 2026: 71% of orgs never pin GitHub Actions to a hash. Your CI pipeline runs third-party code with access to secrets and prod. A mutable tag like actions/checkout@v4 can be compromised silently. It won't. Until it does. #DevSecOps #CICD #GitHubActions

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

Hot take: code review is the most broken part of CI/CD. Not because engineers are bad. Because humans can't parallelize. /ultrareview in Claude Code: parallel agents, findings only surface after verified and reproduced. What blocks thorough review at your team? #ClaudeCode

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

87% of orgs run prod with known exploitable vulnerabilities. Median dependency: 278 days behind latest release. Up from 215 last year. Not zero-days. Known CVEs. Patches exist. Just not applied. Every deploy needs SCA + secrets + SBOM. #DevSecOps #CICD

Michael Moreira (@_michaelmoreira) 's Twitter Profile Photo

The Trivy breach stole secrets from 10,000+ CI runners. That's why every FlowEasy pipeline runs TruffleHog secret scanning by default. No config. No YAML. It just runs. Free tier: floweasy.dev #DevSecOps #CICD #BuildInPublic