Tencent Technical Engineering
Author

Tencent Technical Engineering

Official account of Tencent Technology. A platform for publishing and analyzing Tencent's technological innovations and cutting-edge developments.

107
Articles
0
Likes
301
Views
0
Comments
Recent Articles

Latest from Tencent Technical Engineering

100 recent articles max
Tencent Technical Engineering
Tencent Technical Engineering
Apr 18, 2025 · Fundamentals

I/O Multiplexing in Linux: Detailed Explanation of select, poll, and epoll

Linux treats all I/O devices as files, enabling a single thread to monitor many descriptors via I/O multiplexing; while select and poll use linear scans and suffer size limits, epoll employs an event‑driven red‑black tree with edge‑triggered mode, offering scalable, high‑performance handling for thousands of concurrent connections.

I/O MultiplexingLinuxSystem Programming
0 likes · 30 min read
I/O Multiplexing in Linux: Detailed Explanation of select, poll, and epoll
Tencent Technical Engineering
Tencent Technical Engineering
Apr 16, 2025 · Artificial Intelligence

Understanding Transformer Architecture for Chinese‑English Translation: A Practical Guide

This practical guide walks through the full Transformer architecture for Chinese‑to‑English translation, detailing encoder‑decoder structure, tokenization and embeddings, batch handling with padding and masks, positional encodings, parallel teacher‑forcing, self‑ and multi‑head attention, and the complete forward and back‑propagation training steps.

Positional EncodingPyTorchSelf-attention
0 likes · 26 min read
Understanding Transformer Architecture for Chinese‑English Translation: A Practical Guide
Tencent Technical Engineering
Tencent Technical Engineering
Apr 14, 2025 · Artificial Intelligence

MCP Protocol: Technical Principles and Business Applications

The article examines the Model Context Protocol (MCP), detailing its microkernel‑based technical architecture, development timeline from Anthropic’s 2024 release to industry adoption, hands‑on implementation examples, and business use cases such as multi‑agent QQ robots, highlighting MCP’s potential to standardize AI tool integration across industries.

AI ArchitectureAI applicationsBusiness Implementation
0 likes · 14 min read
MCP Protocol: Technical Principles and Business Applications
Tencent Technical Engineering
Tencent Technical Engineering
Apr 11, 2025 · Information Security

Security Analysis of MCP and A2A Protocols for AI Agents

The article examines critical security flaws in Anthropic’s Model Context Protocol (MCP) and Google’s Agent‑to‑Agent (A2A) protocol—such as hidden tool‑poisoning, rug‑pull, and command‑injection attacks that can hijack AI agents and leak data—while proposing hardening measures like authentication, sandboxing, digital signatures, fine‑grained permissions, and robust OAuth‑based consent to safeguard AI‑agent communications.

A2AAI AgentMCP
0 likes · 26 min read
Security Analysis of MCP and A2A Protocols for AI Agents
Tencent Technical Engineering
Tencent Technical Engineering
Apr 10, 2025 · Information Security

AI-Generated Code Introduces XSS Vulnerabilities: A Case Study and Security Guidance

The Woodpecker team shows that AI‑generated code, exemplified by Simon Willison’s HTML slideshow tool, can embed unsanitized inputs that create exploitable XSS flaws, and they recommend zero‑trust AI prompts, rigorous input filtering, CSP, AI‑assisted scanning, and secure supply‑chain practices to mitigate such risks.

AI securityCSPSimon Willison
0 likes · 9 min read
AI-Generated Code Introduces XSS Vulnerabilities: A Case Study and Security Guidance
Tencent Technical Engineering
Tencent Technical Engineering
Apr 9, 2025 · Artificial Intelligence

Discussion on Model Context Protocol (MCP) and Its Potential Applications

The discussion introduces the Model Context Protocol (MCP) as an open‑source framework that repositions AI from a peripheral add‑on to the central “brain” of software, allowing AI‑first integration with business APIs, reducing rewrites, unifying user interfaces, and promising a rapid open‑source surge that could reshape development, production, and decentralized ecosystems.

AI integrationMCPModel Context Protocol
0 likes · 7 min read
Discussion on Model Context Protocol (MCP) and Its Potential Applications
Tencent Technical Engineering
Tencent Technical Engineering
Apr 7, 2025 · Cloud Native

Deploying MCP Server on Serverless Cloud Functions with Cube Secure Containers

The article explains how to deploy a Model Context Protocol (MCP) server—illustrated with a Python weather‑query example—on Tencent Cloud Function using either a Docker image or direct code upload, leverages Cube’s high‑security lightweight containers for fast start‑up, and highlights serverless benefits such as automatic scaling, cost efficiency, and simplified operations compared with Kubernetes for AI agents and tool integration.

Cloud FunctionsCube Secure ContainerMCP
0 likes · 21 min read
Deploying MCP Server on Serverless Cloud Functions with Cube Secure Containers
Tencent Technical Engineering
Tencent Technical Engineering
Mar 28, 2025 · Artificial Intelligence

Chat‑Style Programming with Cursor: Practices, Insights, and Tips

The article explores Cursor’s chat‑style programming paradigm—highlighting its natural‑language coding, rapid iteration, and AI‑assisted workflow—while offering communication strategies, a reverse‑Feynman learning method, divide‑and‑conquer tactics, the Model Context Protocol, ten practical tips, and a vision of human‑AI hybrid engineers achieving flow and redefining software value.

AI programmingChat-based codingCursor tool
0 likes · 13 min read
Chat‑Style Programming with Cursor: Practices, Insights, and Tips
Tencent Technical Engineering
Tencent Technical Engineering
Mar 27, 2025 · Information Security

AI Programming Assistants Can Be Hijacked: Configuration File Poisoning and Security Risks

AI programming assistants such as GitHub Copilot and Cursor can be hijacked through poisoned configuration files that hide malicious prompts using invisible Unicode characters, exposing developers to risks like data leakage, DDoS, cryptomining and trojan injection, so they must avoid unknown configs, sandbox generated code, and employ static analysis and AI audits to mitigate threats.

AI securitycode poisoningconfiguration files
0 likes · 12 min read
AI Programming Assistants Can Be Hijacked: Configuration File Poisoning and Security Risks