Python
105 posts
PyGeoHash 2025: A Year of Transformation
Looking back at a transformative year for PyGeoHash - from complete rewrites to MIT licensing, type hints to automated publishing, and the community impact of a decade-old library reborn.
Native Structured Outputs: When to Skip the Framework
OpenAI and Anthropic now offer built-in structured output support. Here's when to use native APIs versus validation frameworks.
Comparing Python Libraries for Structured LLM Extraction
A practical comparison of instructor, outlines, and pydantic-ai for getting structured data from LLMs based on production experience.
From Theory to Practice: Building Real Decision Models with Petersburg
A practical guide to modeling complex decisions with Monte Carlo simulation using petersburg, featuring real case studies from startups and drug development.
Keeks 0.3.0: Introducing the Merton Share Strategy
Keeks 0.3.0 adds the Merton Share strategy with configurable risk aversion and maximum entry price calculations for one-time gambles.
SQL Injection Detection with Bandit Rule B608: Beyond the Basics
Learn how Bandit's B608 rule detects SQL injection vulnerabilities in Python. Understand common patterns, secure alternatives, and defense strategies.
Advanced Bandit Configuration: Custom Rules and Team Workflows
Master advanced Bandit features including custom rules, baseline configurations, and team-wide security policies for enterprise Python development.
Bandit Severity Levels: Understanding High, Medium, and Low Findings
Master Bandit's severity and confidence classification system. Learn how to prioritize security findings and build effective remediation workflows.
Bandit's Hardcoded Password Detection: Rules B105-B107 in Practice
Learn how Bandit detects hardcoded passwords in Python code with rules B105, B106, and B107. Includes real examples and secure alternatives.
Bandit Security Rules: Complete Python Vulnerability Guide
Master Python security with this comprehensive guide to Bandit's security rules. Learn what each rule detects and how to fix common vulnerabilities.