<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tutorials on Rex Coleman</title><link>https://rexcoleman.dev/categories/tutorials/</link><description>Securing AI from the architecture up. Research, tools, and methodology for AI security. Creator of govML.</description><image><title>Rex Coleman</title><url>https://rexcoleman.dev/images/og-default.png</url><link>https://rexcoleman.dev/images/og-default.png</link></image><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 19 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rexcoleman.dev/categories/tutorials/index.xml" rel="self" type="application/rss+xml"/><item><title>Apply Adversarial Control Analysis to Your ML System in 3 Steps</title><link>https://rexcoleman.dev/posts/tutorial-aca-three-steps/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>https://rexcoleman.dev/posts/tutorial-aca-three-steps/</guid><description>Classify every input to your ML system by who controls it, then architect your defenses around the features adversaries cannot touch.</description></item><item><title>Build Your Own ML Vuln Prioritizer</title><link>https://rexcoleman.dev/posts/tutorial-ml-vuln-prioritizer/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>https://rexcoleman.dev/posts/tutorial-ml-vuln-prioritizer/</guid><description>Build a Random Forest model that outperforms CVSS at predicting which vulnerabilities actually get exploited, using only public NVD and EPSS data.</description></item><item><title>govML Quickstart: Governed ML in 15 Minutes</title><link>https://rexcoleman.dev/posts/tutorial-govml-quickstart/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>https://rexcoleman.dev/posts/tutorial-govml-quickstart/</guid><description>Install govML, scaffold a governed ML project with one command, and learn how contract-driven development prevents the &amp;#39;I forgot which hyperparameters I used&amp;#39; problem.</description></item><item><title>How to Detect Backdoored ML Models Without Labeled Examples</title><link>https://rexcoleman.dev/posts/tutorial-detect-backdoored-models/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>https://rexcoleman.dev/posts/tutorial-detect-backdoored-models/</guid><description>Extract behavioral fingerprints from ML model activations and use Local Outlier Factor to detect backdoored models with zero labeled training data.</description></item><item><title>How to Red-Team Your AI Agent in 1 Hour</title><link>https://rexcoleman.dev/posts/tutorial-redteam-ai-agent/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>https://rexcoleman.dev/posts/tutorial-redteam-ai-agent/</guid><description>Set up a LangChain agent, run 7 attack classes against it, interpret the results, and apply a 5-layer defense stack -- all for about $2 in API costs.</description></item><item><title>How to Secure Your OpenClaw in 30 Minutes</title><link>https://rexcoleman.dev/posts/secure-openclaw-30-minutes/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://rexcoleman.dev/posts/secure-openclaw-30-minutes/</guid><description>Your AI agent is running 24/7. Here are the 5 biggest security risks and a step-by-step hardening guide.</description></item></channel></rss>