Skip to content
View frenchi's full-sized avatar

Highlights

  • Pro

Block or report frenchi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@chrislloyd
Chris Lloyd chrislloyd
Member of technical staff @anthropics

Anthropic

@stefanesser
Stefan Esser stefanesser

Antid0te Cologne, Germany

@kpwn
kpwn

kjc research

@bdehamer
Brian DeHamer bdehamer

GitHub San Diego, CA

@dend
Den Delimarsky dend
(Reverse) Engineer
@findleyr
Robert Findley findleyr
Software engineer working on Go tools.

New York

@worldwise001
Sarah Harvey worldwise001
funemployed, doing fun things. security, privacy, engineering, management.

Toronto, ON

@dkzlv
Dan Kozlov dkzlv

@indent-com Portugal

@ai
Andrey Sitnik ai
The creator of Autoprefixer, @postcss, @browserslist, and @logux

@evilmartians Barcelona, Spain

@adg
Andrew Gerrand adg

Google Inc. Sydney, Australia

@raesene
Rory McCune raesene
Security Geek, Testing, Docker, Kubernetes, Ruby, Hillwalking.

@DataDog Scotland

@rsc
Russ Cox rsc
Go Hacker. Mistake maker. (he/him)

Google Cambridge, MA

@woodruffw
William Woodruff woodruffw
currently helping build next-gen Python tooling at @astral-sh. also: member @Homebrew, member @pypa, maintainer @zizmorcore

@astral-sh New York, NY

@Amir-Montazery
ostif.org Amir-Montazery
Securing critical open source projects.

Open Source Technology Improvement Fund, Inc

@lifting-bits
Lifting Bits lifting-bits
Binary Translation by @trailofbits

New York, NY

@tetsuo-cpp
Alex Cameron tetsuo-cpp
Compilers, infosec, systems-programming.

Melbourne, Australia

@tenderlove
Aaron Patterson tenderlove
💘💙💜💗💚❤💓💛💚💗

@Shopify Seattle

@SecurityCRob
CRob SecurityCRob
Cat herder trying to help secure the open source

R'lyeh, dreaming

@david-a-wheeler
David A. Wheeler david-a-wheeler
My work title is "Director of Open Source Supply Chain Security" at the Linux Foundation. Much of this isn't work though.

Linux Foundation

@opencontainers
Open Container Initiative opencontainers
Creating open standards around container technology
@mchmarny
Mark Chmarny mchmarny
Working on DGX Cloud at NVIDIA. Ex Google Cloud, Apple ACS, Azure OCTO. Cascadian. Rabid Arsenal fan

NVIDIA Portland, OR

@annebdh
Anne B annebdh
Mostly experimental scripty hacks that are never updated, outdated repos, and docs.
@znewman01
Zack Newman znewman01

Chainguard Brooklyn, NY

@developer-guy
Batuhan Apaydın developer-guy
🚀CNCF Ambassador 23 🎖Best Sigstore Evangelist 23 🐳Docker Captain 23 ✍️ CDF Ambassador 23 📅 Organizer at DevOpsTr • @cloudnativetr

@trendyol compromised

@mihaimaruseac
Mihai Maruseac mihaimaruseac
Supply chain security @ Google OSS Security Team. Previously TensorFlow Security & OSS (@ Google); Haskell+differential privacy+ML @ LeapYear.

Google San Francisco

@datosh
Fabian Kammel datosh
Principal Security Consultant @controlplaneio

control-plane.io Berlin, Germany

@naveensrinivasan
Naveen naveensrinivasan
Contributes to fun OSS projects like https://github.com/ossf and is a Google Open Source Peer Bonus award winner for 2021,2022 and 2024.
@awwad
Sebastien Awwad awwad
Secure design. Former maintainer&lead dev for Uptane & The Update Framework (TUF) ref implementations, and conda-content-trust. pubkey fp: BC0C6DEDD5E5CC0

New York, NY

@spencerschrock
Spencer Schrock spencerschrock
Google OSS Security Team

@google Boulder, CO

@MarkLodato
Mark Lodato MarkLodato

Google New York, NY