Product Security Intern · Bangalore
Ashmith
Maddala
I'm a security engineer doing product security at Vontier — AppSec reviews, threat modeling, secure SDLC. Outside of that, I build tools and break things to understand how to protect them.
What I am spending energy on right now
Working close to the product lifecycle: appsec reviews, threat modelling, and practical secure SDLC guidance for engineering teams.
Security tooling, automation, and small systems that make repeated security work cleaner, faster, and more useful.
Football, long walks, training, and writing. The non-work part matters because it keeps the work sharper.
Tools I reach for the most
Projects with more depth than a repo list
A few pieces that reflect how I think: hands-on security, practical tooling, and systems built to teach me something real.
CLI Packet Analyzer
Built to get closer to raw traffic instead of treating packets like abstract theory. It captures traffic, parses protocols, and turns low-level networking into something inspectable from the command line.
It shows the security mindset I care about most: understand systems deeply enough to reason about what is actually happening on the wire.
AI Vulnerability Scanner
An experiment in blending code analysis and machine-learning-assisted detection to surface risky patterns in a codebase faster.
It sits right at the overlap of my interests: application security, automation, and building tools that help humans make better decisions sooner.
Red vs Blue CTF Platform
A training environment shaped around attack-and-defend thinking instead of isolated toy exercises. The goal is to make learning feel competitive, structured, and closer to real tradeoffs.
It reflects the part of security I enjoy most: building environments where offense and defense both sharpen your understanding.
A faster way to explore the site
If scrolling feels too static, use the terminal. It is part personality, part navigation layer, and part excuse to make the portfolio more fun to inspect.
tap to type