<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CramHacks</title>
    <description>Whether shaping strategy or crafting code, CramHacks keeps you informed.</description>
    
    <link>https://www.cramhacks.com/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/uGY9n2H0Mg.xml" rel="self"/>
    
    <lastBuildDate>Mon, 2 Mar 2026 19:44:40 +0000</lastBuildDate>
    <pubDate>Wed, 27 Aug 2025 17:27:23 +0000</pubDate>
    <atom:published>2025-08-27T17:27:23Z</atom:published>
    <atom:updated>2026-03-02T19:44:40Z</atom:updated>
    
      <category>Software Engineering</category>
      <category>Cybersecurity</category>
      <category>Technology</category>
    <copyright>Copyright 2026, CramHacks</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/b18c76af-3b03-4833-bf24-58926c8ad324/CramHacks_A2__2_.png</url>
      <title>CramHacks</title>
      <link>https://www.cramhacks.com/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>CramHacks Chronicles #96: Bi-Weekly Cybersecurity Newsletter!</title>
  <description>Nx Malware, Immutable Releases, GitHub Actions Policy, PyPI Domain Protection, OPA, CodeRabbit RCE, Typosquatting GHCR, Reachability?</description>
  <link>https://www.cramhacks.com/p/cramhacks-96</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-96</guid>
  <pubDate>Wed, 27 Aug 2025 17:27:23 +0000</pubDate>
  <atom:published>2025-08-27T17:27:23Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">I’m of course grateful to have this outlet to share my findings and thoughts with the broader community. But, I’m really glad I switched to biweekly with the newsletter. These past two weeks have been uber-productive for both my day job and side projects! </p><h2 class="heading" style="text-align:left;" id="a-note-on-reachability-analysis-usi">A note on reachability analysis (using static analysis)</h2><p class="paragraph" style="text-align:left;">It’s a good feature, but damn near no one using the feature actually understands it, and I’m losing my mind hearing people say “We only remediate reachable findings.” It’s hard to blame them when the industry shouts “only prioritize reachable findings” from the mountain-tops, but the fact of the matter is that a significant percentage of findings will be labeled as “undetermined,” “maybe reachable,” or similar. These can be just as severe as reachable ones!!</p><p class="paragraph" style="text-align:left;">Why so many undetermined? Reachability analysis is largely only effective for software libraries, which are packages you import and call directly. How much of today’s SCA findings actually stem from vulnerable libraries as opposed to frameworks, plugins, cli tools, etc.? </p><p class="paragraph" style="text-align:left;">Looking at PyPI, there are currently ~3,900 known security advisories in the ecosystem. As an experiment, I sought to classify the affected packages listed in all the advisories as “library” or “not a library.” To do this, I used the <a class="link" href="https://github.com/github/gh-models?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">gh CLI extension for the GitHub Models service</a>, created system & user prompts, and used variables for the security advisory details. Each advisory was passed to the prompt for classification. </p><p class="paragraph" style="text-align:left;"><i>Side Note: This Models feature is pretty sweet. Free access to a nice selection of models w/o having to manage API keys for each of them </i>😍<i>. Rate limiting was a bit annoying, but it’s extremely reasonable for being free. </i></p><p class="paragraph" style="text-align:left;">Given this was just a first pass, I wanted to err on the side caution, and so the classification favored “library.” Even then, <b>only 46% of affected packages were classified as “library”</b>. Meaning reachability analysis offers no value. Some tools may try to use reachability for framework configurations, but that’s a recipe for false negatives.</p><p class="paragraph" style="text-align:left;"><i>Just based on personal experience, I hypothesized the correct percentage would be between 20-35%. On next pass I’d like to also include the readme contents of the package, as many advisory details defaulted to “library” because of insufficient information.</i></p><p class="paragraph" style="text-align:left;"><i><b>P.S.</b></i> An interesting finding: TensorFlow security advisories (&gt;400) account for over 10% of all PyPI security advisories. </p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/nrwl/nx/security/advisories/GHSA-cxm3-wv7p-598c?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Nx Supply Chain Attack: Malware Leaks Credentials</a></b><br>A compromised npm token led to publishing Nx build system packages containing malicious postinstall scripts. The script gathered credentials and then published them as an encoded string to a GitHub repo named &quot;s1ngularity-repository&quot; under the user’s account. Roughly 1,400 users are known to have bene impacted. </p><p class="paragraph" style="text-align:left;">👋 Unfortunately package repositories have yet to begin leveraging provenance attestation to prevent potentially malicious package releases. E.g., if a previous release contained an attestation, and the new one does not, that’s a red flag. But <a class="link" href="https://docs.npmjs.com/trusted-publishers?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">npm did recently announce trusted publishing</a>, which helps take care of the compromised npm token issue, by eliminating those tokens altogether. Unfortunately, the maintainers just hadn’t gotten around to enabling it yet, which is totally reasonable given it’s a new feature.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/changelog/2025-08-26-releases-now-support-immutability-in-public-preview/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Releases now support immutability in public preview</a></b><br>🥳 My team has launched Immutable Releases in public preview, enabling repositories and organizations to lock assets and tags after publication, thereby safeguarding against supply chain tampering. This feature includes signed attestations in <a class="link" href="https://docs.sigstore.dev/about/bundle/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Sigstore bundle format</a> for verifying asset integrity and authenticity via GitHub CLI commands.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Typosquatting the GitHub Container Registry</a></b><br>GitHub maintains a legitimate registry hosted at ghcr[.]io, however, as the community has recently discovered, someone is running a malicious service at ghrc[.]io. At first glance it doesn’t appear to be malicious, but as <a class="link" href="https://www.linkedin.com/in/brandonhmitchell/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Brandon Mitchell</a> points out, it is indeed listening for <code>/v2/</code> API calls and responding with what is needed to trigger an OCI client to send credentials. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.openpolicyagent.org/note-from-teemu-tim-and-torin-to-the-open-policy-agent-community-2dbbfe494371?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Note from Teemu, Tim, and Torin to the Open Policy Agent community</a></b><br>The creators of Open Policy Agent (OPA) and many Styra team members have joined Apple to continue developing OPA as an open-source solution for unified policy enforcement across cloud-native stacks, with Apple leveraging OPA for its global-scale cloud service authorization infrastructure.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://research.kudelskisecurity.com/2025/08/19/how-we-exploited-coderabbit-from-a-simple-pr-to-rce-and-write-access-on-1m-repositories/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Exploiting CodeRabbit: RCE and Write Access on 1M Repositories</a></b><br>A nasty bug in CodeRabbit’s Rubocop setup let attackers run arbitrary Ruby code that exfiltrated private keys which offered write access to over 1 million GitHub repos!</p><p class="paragraph" style="text-align:left;">👋 CodeRabbit is the most installed AI app on GitHub & Gitlab. They failed to sandbox a tool capable of executing arbitrary code, in an environment containing a private key used to generate access tokens to all onboarded repos, that is brutal. Reportedly, Rubocop was the only tool in CodeRabbit’s arsenal that was inadequately sandboxed. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.pypi.org/posts/2025-08-18-preventing-domain-resurrections/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">PyPI: Preventing Domain Resurrection Attacks</a></b><br>PyPI now monitors domain expiration to block domain resurrection attacks, where attackers buy expired domains to hijack accounts via password resets. Since June 2025, more than 1,800 email addresses have been unverified due to their associated domains expiring.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/changelog/2025-08-15-github-actions-policy-now-supports-blocking-and-sha-pinning-actions/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Actions policy now supports blocking and SHA pinning actions</a></b><br>GitHub Actions now lets organizations define policies to allow specific actions, block others, and enforce SHA pinning, ensuring workflows use trusted, pinned commits to prevent supply chain attacks.</p><p class="paragraph" style="text-align:left;">👋 There’s a lot of room for improvements in how we consume GitHub Actions, but this is a big step in the right direction! </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-96-bi-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=178a888f-cc03-40a1-89fe-0ae3cef87859&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #95: Weekly Cybersecurity Newsletter!</title>
  <description>dependabot supports vcpkg, Python package installers: zip parser confusion attacks, DALEQ: java binary equivalence, BAXBENCH: Can LLMs Generate Correct and Secure Backends?</description>
  <link>https://www.cramhacks.com/p/cramhacks-95</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-95</guid>
  <pubDate>Wed, 13 Aug 2025 18:02:16 +0000</pubDate>
  <atom:published>2025-08-13T18:02:16Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">Straight to the point: Writing this newsletter takes up a tremendous amount of my time, and it’s taking away from other exciting projects. That said, I’m emotionally attached after almost two years of publishing weekly content, and so I’ll be moving to one newsletter every two weeks. Just to free up some bandwidth.</p><p class="paragraph" style="text-align:left;">This ofc may change in the future, especially as I’m really excited about the projects I’ve been tinkering on and I want to share the excitement with you all!</p><p class="paragraph" style="text-align:left;"><i>Admittedly, this is in part due to hacker summer camp. I loved learning and discussing about so many projects, but there are ideas that seemingly no one else is investigating, and I want to know what the outcome would be! Which implies that I’ll have to do it myself </i>😄.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/changelog/2025-08-12-dependabot-version-updates-now-support-vcpkg/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Dependabot version updates now support vcpkg</a></b><br>Receive automatic dependency updates for vcpkg and keep C/C++ dependencies up-to-date. Note: this is for version updates and not specifically security updates.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.pypi.org/posts/2025-08-07-wheel-archive-confusion-attacks/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Preventing ZIP parser confusion attacks on Python package installers</a></b><br>PyPI is implementing new restrictions to prevent ZIP parser confusion attacks on package installers, specifically <a class="link" href="https://blog.pypi.org/posts/2025-08-07-wheel-archive-confusion-attacks/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter#:~:text=automated%20detection%20tools.-,What%20is%20PyPI%20doing%20to%20prevent%20ZIP%20confusion%20attacks%3F,-The%20correct%20method" target="_blank" rel="noopener noreferrer nofollow">rejecting ZIP archives that exploit vulnerabilities in the ZIP format</a>.</p><p class="paragraph" style="text-align:left;">👋 <a class="link" href="https://astral.sh/blog/uv-security-advisory-cve-2025-54368?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">uv security advisory: ZIP payload obfuscation</a></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://lists.reproducible-builds.org/pipermail/rb-general/2025-August/003853.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">DALEQ: An Open-Source Tool for Assessing Java Binary Equivalence</a></b><br>Detailed <a class="link" href="https://arxiv.org/abs/2508.01530?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">research paper</a> & <a class="link" href="https://github.com/binaryeq/daleq/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Repo</a>.</p><p class="paragraph" style="text-align:left;">👋 I haven’t read this yet, but I wanted to share it because there’s clearly a growing interest in verifying reproducible builds. 👀 Really hope the industry progresses down this path! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://labs.zenity.io/p/when-a-jira-ticket-can-steal-your-secrets?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">AgentFlayer: When a Jira Ticket Can Steal Your Secrets</a></b><br><a class="link" href="https://www.linkedin.com/in/marina-simakov-214594137/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Marina Simakov</a> demos how running cursor in auto-run mode and prompting it to help with handling a Jira ticket can lead to compromise. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://arxiv.org/abs/2502.11844?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">BAXBENCH: Can LLMs Generate Correct and Secure Backends?</a></b><br>A new evaluation benchmark featuring 392 tasks has been developed to assess the effectiveness of large language models (LLMs) in generating secure production-quality, self-contained backend application modules. The best performing model, OpenAI o1, achieved 62% on code correctness, and around half of the correct programs contained vulnerabilities exploited by the researchers.</p><p class="paragraph" style="text-align:left;">👋 This paper is worth a read, I’ve only skimmed it but I’ll definitely be circling back. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Copilot: putting Copilot into YOLO mode via prompt injection</a></b><br><a class="link" href="https://x.com/wunderwuzzi23?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">wunderwuzzi23</a> blogs about <a class="link" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53773?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE-2025-53773</a> where a prompt injection planted in content (e.g., source code file, web page, GitHub issue) to enter VS code into “YOLO” mode by setting <code>“chat.tools.autoApprove”: true</code>, in the <code>~/.vscode/settings.json</code> file. </p><p class="paragraph" style="text-align:left;">👋 Ironically, I was looking into these types of attacks this weekend. We’ve given AI the ability to create, change, and delete files. What risks are there in allowing this? Assuming there are restrictions to actions outside of the platform (or IDE), are there elements (or settings) inside the platform that can be manipulated for lateral movement? I think we’ll find many more cases like this moving forward. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/SpecterOps/GitHound?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHound: A BloodHound OpenGraph collector for GitHub</a></b><br><a class="link" href="https://www.linkedin.com/in/jaredcatkinson/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jared Atkinson</a>, CTO of SpectreOps, has open-sourced GitHound, a BloodHound OpenGraph collector for GitHub, designed to map your organization’s structure and permissions into a navigable attack‑path graph.</p><p class="paragraph" style="text-align:left;">👋 I’ve not used this myself, but I’m surprised it hasn’t been met with more excitement. There’s a lot of opportunity here to gain insights into an organization’s structure, permissions, and potential attack paths on GitHub. It’s also a great example of how BloodHound can be used to detect attack paths in SaaS platforms as a whole. </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-95-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=30197e0f-630e-420c-a1f2-bd731c85a93c&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #94: Weekly Cybersecurity Newsletter!</title>
  <description>MCP Context Protector, Provenance Signing &amp; Verification for Model Hubs, Cursor&#39;s Questionable Denylist, CodeQL Support for Rust, CISA SBOM Community Closes Doors</description>
  <link>https://www.cramhacks.com/p/cramhacks-94</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-94</guid>
  <pubDate>Wed, 30 Jul 2025 17:27:55 +0000</pubDate>
  <atom:published>2025-07-30T17:27:55Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">The grind continues, but will come to a halt starting tomorrow 🥲. Looking forward to some PTO before DEF CON to relax. </p><p class="paragraph" style="text-align:left;">No CramHacks next week; see y’all at or post-Vegas! Stop by AppSec Village and catch <a class="link" href="https://www.appsecvillage.com/events/dc-2025/scaling-bug-hunting-in-open-source-software-943106?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">my talk</a> Friday morning 😁.</p><hr class="content_break"><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><a class="image__link" href="https://socket.dev/blog/introducing-socket-mcp-for-claude-desktop?utm_source=cramhacks&utm_medium=email&utm_campaign=socket-mcp&utm_id=2025-7&utm_content=product" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7cc1bc44-e5bf-4ca6-a8b0-dc505e2ac0f4/socket%2Bclaude%2Bcramhacks.jpg?t=1753894787"/></a></div><p class="paragraph" style="text-align:left;">Meet the easiest way to secure your vibe coding. Socket MCP for Claude Desktop flags bad packages in real time — no setup required. <span style="text-decoration:underline;"><a class="link" href="https://socket.dev/blog/introducing-socket-mcp-for-claude-desktop?utm_source=cramhacks&utm_medium=email&utm_campaign=socket-mcp&utm_id=2025-7&utm_content=product" target="_blank" rel="noopener noreferrer nofollow">Try it free</a></span> or <span style="text-decoration:underline;"><a class="link" href="https://socket.dev/demo?utm_source=cramhacks&utm_medium=email&utm_campaign=demo&utm_id=2025-7&utm_content=product" target="_blank" rel="noopener noreferrer nofollow">book a demo</a></span> today.</p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.trailofbits.com/2025/07/28/we-built-the-security-layer-mcp-always-needed/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Trail of Bits: We built the security layer MCP always needed</b></a><br>The project, <a class="link" href="https://github.com/trailofbits/mcp-context-protector?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">mcp-context-protector</a>, is a security wrapper for LLM apps using the Model Context Protocol (MCP). The primary goal here is to protect the LLM’s context window which is susceptible to attacks such as <a class="link" href="https://blog.trailofbits.com/2025/04/21/jumping-the-line-how-mcp-servers-can-attack-you-before-you-ever-use-them/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">line jumping</a>, also known as tool poisoning. </p><p class="paragraph" style="text-align:left;">Line jumping occurs when an app prompts an MCP server for its tool descriptions. The descriptions are added to the model’s context window and are therefore ripe for prompt injection.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.backslash.security/blog/cursor-ai-security-flaw-autorun-denylist?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The Denylist Delusion: Cursor’s Auto-Run Leaves Agentic AI Wide Open</a></b><br><i>“we quickly realized that the denylist security feature, at least as currently implemented, was woefully inadequate, if not outright worthless.” </i>Backslash Security Researchers Mustafa Naamneh and Micah Gold detail trivial methods for evading Cursor’s denylist feature.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://openssf.org/blog/2025/07/23/case-study-google-secures-machine-learning-models-with-sigstore/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Case Study: Google Secures Machine Learning Models with sigstore</a></b><br>Following last month’s announcement revealing the <a class="link" href="https://github.com/ossf/model-signing-spec?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OpenSSF Model Signing (OMS) Specification</a>, it has now been integrated into <a class="link" href="https://developer.nvidia.com/blog/?p=103777&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">NVIDIA’s NGC</a> and Google’s Kaggle. This means models can be signed during upload and verified at each use! </p><p class="paragraph" style="text-align:left;">👋 I’m glad to see this for a multitude of reasons. Firstly, model tampering and untrusted provenance of models is not something we should just ignore. Secondly, we’re still relatively early in the model hub universe — could this become a requirement for major model hubs? 🤞 Thirdly, it’s just great to see how the community doesn’t want to repeat the same mistakes. We’ve spun up countless package ecosystems, we need to apply our lessons-learned to future ones! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.linkedin.com/feed/update/urn:li:activity:7353869956188389378/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The CISA SBOM Community is shutting down</a></b><br>Allan Friedman has announced his departure from CISA where he has led CISA’s efforts to advance SBOM around the globe. To most in this space, Allan and SBOMs are synonymous. He has been instrumental for building communities, spreading awareness, and bettering how we all handle software transparency. Thank you Allan for all that you’ve done! I look forward to seeing what’s next for you. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.herodevs.com/blog-posts/herodevs-announces-125-million-strategic-growth-investment-from-psg?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>HeroDevs Announces $125 Million Strategic Growth Investment from PSG</b></a><br>HeroDevs has secured $125M in private equity funding to focus on growth. In addition, HeroDevs has announced that they’ve dedicated $20 million of capital towards its <a class="link" href="https://www.herodevs.com/sustainability-fund?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open Source Sustainability Fund</a>. </p><p class="paragraph" style="text-align:left;">👋 The Open Source Sustainability Fund is interesting. Yes, it does put money in the pockets of open source maintainers, that’s great. But it sure seems like this is primarily a way to incentivize OSS maintainers to create customers for HeroDevs by better disclosing project versions as EoL. It’s not clear, but I suspect they also uses this fund and their relations from the fund to better support EoL versions, which is their product. I’m not familiar with the tax code, but could this maybe be a clever way to write off a chunk of the work required to offer their services?</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.calcalistech.com/ctechnews/article/b1bqweidee?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Seal Security raises $13M Series A to automate open-source vulnerability fixes</a></b><br>👋 Congrats to Seal Security. I frankly don’t think vulnerabilities alone is a good enough reason to use vendor-managed OSS packages. But there seems to be a market for it.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/changelog/2025-06-30-codeql-support-for-rust-now-in-public-preview/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CodeQL support for Rust now in public preview</a></b><br>Support for .rs, Cargo.toml extensions. Requires rustup and cargo to be installed. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://cve.icu/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE analytics from 1999 to 2025</a></b><br>👋 <a class="link" href="https://www.linkedin.com/in/jgamblin/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jerry Gamblin</a> has given his passion project, <a class="link" href="http://cve.icu?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">cve.icu</a>, a makeover, and I love it! Every time I look at these analytics I learn something new about the CVE Program. </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-94-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=af5c28c1-b3a5-484e-b288-8c1a5ce23753&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #93: Weekly Cybersecurity Newsletter!</title>
  <description>G-Suite Prompt Injections, compromised npm maintainer, crates.io announces trusted publishing, Google&#39;s OSS-Rebuild project, container isolation</description>
  <link>https://www.cramhacks.com/p/cramhacks-93</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-93</guid>
  <pubDate>Wed, 23 Jul 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-07-23T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">This week I’ve reflected a bit on the software supply chain security space. The outcome was rather positive. Only a few years ago I struggled to find anyone who has even heard the term, eventually it became “oh, is that the SBOM stuff?”, and now I find myself in rooms with folks familiar with dependency vulnerabilities, OSS licensing, the SLSA framework, Sigstore, extension risks, etc. </p><p class="paragraph" style="text-align:left;">Yeah, we still have a long ways to go on the technology-front, but the progress on the first stage has been tremendous: Acknowledging that we have a problem. </p><hr class="content_break"><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">I was on the Simply Defensive podcast! The most important takeaway is in the name. Throwback to <a class="link" href="https://www.cramhacks.com/p/cramhacks-6?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>newsletter #6 titled: </b></a><a class="link" href="https://www.cramhacks.com/p/cramhacks-6?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><i><b>is coffee supply chain?</b></i></a><b> </b>🤣.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/hauMr3t3L_8" width="100%"></iframe></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://0din.ai/blog/phishing-for-gemini?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Google Gemini G-Suite Prompt Injection Vulnerability</a></b><br>Malicious actors can leverage white text (hidden) text in an email’s body to perform a prompt injection against the Gemini Summarize feature. You can abuse Gemini’s prompt hierarchy by wrapping the prompt injection with &lt;Admin&gt;. Victims are tricked into calling phone numbers, visiting URLs, and more. </p><p class="paragraph" style="text-align:left;">👋 Google is aware of this and is regularly introducing mitigating controls, but the attack vector is reportedly still viable today. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://x.com/JounQin/status/1946297662069993690?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">JounQin</a></b><b><a class="link" href="https://x.com/JounQin/status/1946297662069993690?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">: npm package maintainer token compromised</a></b><br>The npm token for a maintainer of widely used packages was compromised after falling victim to a phishing email impersonating npm. Malicious versions of popular packages <a class="link" href="https://www.npmjs.com/package/eslint-config-prettier?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">eslint-config-prettier</a>, <a class="link" href="https://www.npmjs.com/package/eslint-plugin-prettier?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">eslint-plugin-prettier</a>, <a class="link" href="https://www.npmjs.com/package/synckit?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">synckit</a>, <a class="link" href="https://www.npmjs.com/package/@pkgr/core?activeTab=readme&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">@pkgr/core</a>, and <a class="link" href="https://www.npmjs.com/package/napi-postinstall?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">napi-postinstall</a> were published to the registry.</p><p class="paragraph" style="text-align:left;">These packages combined receive ~100M downloads per week and each had at least one malicious version published due to this token compromise. The root cause appears to be a phishing email impersonating npm, using the domain <code>npnjs[.]com</code>.</p><p class="paragraph" style="text-align:left;">👋 While I was investigating popular open source package maintainers it stood out to me how few maintainers are actually involved in the world’s most popular packages. JounQin has published 266 packages with almost 200M downloads this past week. Another maintainer, wooorm, who seems to be affiliated with JounQin somehow, has published 728 packages with 1.2B downloads this past week.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.rust-lang.org/2025/07/11/crates-io-development-update-2025-07/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">crates.io: announces trusted publishing</a></b><br>The latest <a class="link" href="http://crates.io?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">crates.io</a> development update includes the announcement of Trusted Publishing support via GitHub Actions! <a class="link" href="https://rust-lang.github.io/rfcs/3691-trusted-publishing-cratesio.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">RFC here for more details</a>. If you’re not familiar, Trusted Publishing means goodbye to long-lived tokens for package maintainers. Instead, the OIDC token generated by your workflow is used to generate a short-lived token for publishing.</p><p class="paragraph" style="text-align:left;">👋 I love Trusted Publishing and you should too. Coming soon for npm! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html?m=1&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Introducing OSS Rebuild: Open Source, Rebuilt to Last</a></b><br>Google’s <a class="link" href="https://www.linkedin.com/in/matthewsuozzo/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Matthew Suozzo</a> announces <a class="link" href="https://github.com/google/oss-rebuild?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OSS Rebuild</a>, a new project reproducing upstream packages. Through automations and heuristics, they’ve reproduced thousands of packages in the npm, PyPI, and <a class="link" href="http://crates.io?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">crates.io</a> ecosystems. A provenance attestation has been generated for each reproduced package & version, making it possible for consumers to verify a package’s origin. </p><p class="paragraph" style="text-align:left;">👋 The article states it helps detect several classes of supply chain compromise, including <i>“Stealthy Backdoors - Even sophisticated backdoors like xz often exhibit anomalous behavioral patterns during builds.”</i> Not sure I’m onboard with that claim 😅. Side note, this feels awfully similar to the <a class="link" href="https://cloud.google.com/security/products/assured-open-source-software?hl=en&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Assured Open Source Software</a> product offering. I wonder if they’re using OSS Rebuild as part of that product offering.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/kubernetes/kubernetes/issues/133115?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Kubernetes Image Builder: (CVE-2025-7342) Default Creds for windows image</a></b><br>When using vulnerable versions of <a class="link" href="https://github.com/kubernetes-sigs/image-builder?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">image-builder</a>, default credentials will be applied to Windows images built using the Nutanix or OVA provider, unless explicitly overrode. This leaves nodes using these images vulnerable to unauthorized access via protocols such as ssh, RDP, and WINRM. </p><p class="paragraph" style="text-align:left;">👋 The CVSS was rated a <a class="link" href="https://www.first.org/cvss/calculator/3-1?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" target="_blank" rel="noopener noreferrer nofollow">High (8.1)</a>, but the attack complexity was assigned “low.” I’m not sure I agree with that 🤔. Definitely feels like a critical to me. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">NVIDIAScape - Critical Vulnerability: NVIDIA Container Toolkit </a></b><br>From Pwn2Own Berlin, Wiz has disclosed the technical details for a vulnerability exploit allowing attackers to bypass container isolation measures for root access on the host machine. The issue is introduced by how the NVIDIA Container Toolkit handles OCI hooks.</p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-93-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=3e6ecdd6-2cfd-4c40-99cb-22a9db53d770&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #92: Weekly Cybersecurity Newsletter!</title>
  <description>What $270,000 of bug hunting open source gets you, Post-quantum cryptographic scanner pqscan, mcp-remote RCE, North Korean malicious npm packages</description>
  <link>https://www.cramhacks.com/p/cramhacks-92</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-92</guid>
  <pubDate>Wed, 16 Jul 2025 17:30:01 +0000</pubDate>
  <atom:published>2025-07-16T17:30:01Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">I’m in grind mode. I’ve barely been outside lately, but my excuse is that I ran out of contact lenses and moving around while wearing my glasses gives me migraines. Tomorrow I’ll be going to the optometrist and speaking at the local OWASP meetup. I’ve also finally booked my travel for Vegas next month, hope to see a bunch of y’all there!</p><p class="paragraph" style="text-align:left;">Check out Socket’s latest blog post on North Korean threat actors leveraging malicious npm Packages. Given how active they are in this space, maybe I should ask, are any of you subscribers a North Korean package malware author? 😅 </p><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><a class="image__link" href="https://socket.dev/blog/contagious-interview-campaign-escalates-67-malicious-npm-packages?utm_source=cramhacks&utm_medium=email&utm_campaign=research&utm_id=2025-7&utm_content=nk" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/96189ec4-24f8-4db7-a9bd-52002914336c/NK_Contagious_Interview_Campaign_Ad.png?t=1752684195"/></a></div><p class="paragraph" style="text-align:left;">Get the full list of malicious packages, IOCs, C2 infrastructure, and loader behaviors in this detailed breakdown of North Korea’s most persistent open source supply chain campaign to date. ➜ <a class="link" href="https://socket.dev/blog/contagious-interview-campaign-escalates-67-malicious-npm-packages?utm_source=cramhacks&utm_medium=email&utm_campaign=research&utm_id=2025-7&utm_content=nk" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(17, 85, 204)">Read the research</a></p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://aws.amazon.com/about-aws/whats-new/2025/07/ai-agents-tools-aws-marketplace/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Introducing AI agents and tools in AWS Marketplace</a></b><br><i>“AWS Marketplace now offers AI agents and tools from AWS Partners, allowing customers to find and buy third-party AI agent solutions with streamlined procurement and multiple deployment options.”</i></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://jfrog.com/blog/2025-6514-critical-mcp-remote-rce-vulnerability/?utm_source=LinkedIn&utm_medium=socialposts&utm_campaign=mcpremote&utm_content=pr" target="_blank" rel="noopener noreferrer nofollow">Critical RCE Vulnerability in mcp-remote: Threatens LLM Clients</a></b><br>Jfrog’s <a class="link" href="https://www.linkedin.com/in/orpeles/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Or Peles</a> discusses <a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6514?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE-2025-6514</a>, a vulnerability in the popular open source mcp-remote project. The project enables local MCP Clients that only support local servers, to connect to a Remote MCP Server. The baked-in auth support triggers the server to send an <code>authorization_endpoint</code> response value, which is opened by the client for the user to authenticate. Via a MiTM attack, a malicious actor can manipulate the value and leverage the file URI scheme to achieve code execution on Windows clients e.g., <code>file:/c:/windows/system32/calc.exe?response_type=code</code>.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://daniel.haxx.se/blog/2025/07/11/cybersecurity-risk-assessment-request/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Cyber Resilience Act: curl project receives risk assessment request</a><br><i>“As part of our ongoing efforts to comply with the EU Cyber Resilience Act (CRA), we are currently conducting a cybersecurity risk assessment of third-party software vendors whose products or components are integrated into our systems.”</i></p><p class="paragraph" style="text-align:left;">👋<i> </i>I can’t begin to imagine how I’d react to a message like this as an open source maintainer. Merriam-Webster says a Vendor is “one that vends : seller.” As per Daniel, the project has no contract with the f500 whom submitted the request. I wonder, how many dollars are being wasted by this entity to <span style="color:rgb(34, 34, 34);font-family:DDG_ProximaNova, DDG_ProximaNova_UI_0, DDG_ProximaNova_UI_1, DDG_ProximaNova_UI_2, DDG_ProximaNova_UI_3, DDG_ProximaNova_UI_4, DDG_ProximaNova_UI_5, DDG_ProximaNova_UI_6, "Proxima Nova", -apple-system, "system-ui", "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", Arial, "Noto Sans", sans-serif, sans-serif, DDG_ProximaNova, DDG_ProximaNova_UI_0, DDG_ProximaNova_UI_1, DDG_ProximaNova_UI_2, DDG_ProximaNova_UI_3, DDG_ProximaNova_UI_4, DDG_ProximaNova_UI_5, DDG_ProximaNova_UI_6, "Proxima Nova", -apple-system, "system-ui", "Segoe UI", Roboto, Oxygen-Sans, Ubuntu, Cantarell, "Helvetica Neue", Arial, "Noto Sans", sans-serif;font-size:16.4571px;">impose</span> these requests on open source project maintainers? 💸 </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.anvilsecure.com/blog/scanning-for-post-quantum-cryptographic-support.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Scanning for Post-Quantum Cryptographic (PQC) Support</a></b><br>Anvil Secure has launched an open-source tool <a class="link" href="https://github.com/anvilsecure/pqcscan?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">pqcscan</a>, that can determine whether SSH and TLS servers support PQC algorithms.</p><p class="paragraph" style="text-align:left;">👋 Can’t wait for 2030, when every pentest report will include a long list of services lacking PQC support 🤦.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://tech.quantco.com/blog/conda-regulation-support?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Making the conda(-forge) ecosystem ready for cybersecurity regulations</a></b></p><h2 class="heading" style="text-align:left;" id="bug-hunting-at-scale">Bug Hunting at Scale</h2><p class="paragraph" style="text-align:left;">In preparation for my AppSec Village talk, I’ve been reviewing data relevant to scaled bug hunting in open source software (OSS). One such example of this is <a class="link" href="https://alpha-omega.dev/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Alpha-Omega</a>, an OpenSSF-associated project funded by Microsoft, Google, Amazon, and Citi.</p><p class="paragraph" style="text-align:left;">Between 2023-2024, <a class="link" href="https://www.openrefactory.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OpenRefactory</a> was granted $270,000 <i>“for the purpose of reporting security vulnerabilities at scale in open source projects and working with the maintainers to get those vulnerabilities fixed.” </i>The scope consisted of scanning the top 10,000 Java/Python open source projects using their proprietary Intelligent Code Repair (iCR) tool and the <a class="link" href="https://github.com/ossf/alpha-omega/tree/main/omega/analyzer?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Omega Analyzer</a>. The scope focuses on the following security categories:</p><ul><li><p class="paragraph" style="text-align:left;">SQL Injection</p></li><li><p class="paragraph" style="text-align:left;">Cross-Site Scripting (XSS)</p></li><li><p class="paragraph" style="text-align:left;">Command Injection</p></li><li><p class="paragraph" style="text-align:left;">Path Manipulation</p></li><li><p class="paragraph" style="text-align:left;">Deserialization</p></li><li><p class="paragraph" style="text-align:left;">XML External Entity (XXE) Injection</p></li></ul><p class="paragraph" style="text-align:left;"><i>Omega Analyzer was a suite of 20+ scanners, but it hasn’t received a commit in over 2 years, so I suspect this was not used by OpenRefactory. Notes from early-on in the project suggest that the Analyzer produced too much noise.</i></p><p class="paragraph" style="text-align:left;">Fortunately, this project included monthly updates that were recorded and are publicly available. <a class="link" href="https://github.com/ossf/alpha-omega/tree/main/alpha/engagements/2023/OpenRefactory?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">2023</a> & <a class="link" href="https://github.com/ossf/alpha-omega/tree/main/alpha/engagements/2024/OpenRefactory?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">2024</a></p><p class="paragraph" style="text-align:left;">In the end, after ~18 months, <a class="link" href="https://github.com/ossf/alpha-omega/blob/main/alpha/engagements/2024/OpenRefactory/update-2024-12.md?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">the results included</a>:</p><ul><li><p class="paragraph" style="text-align:left;">10,250 projects analyzed</p><ul><li><p class="paragraph" style="text-align:left;">Python: 9,817 </p></li><li><p class="paragraph" style="text-align:left;">Java: 216 </p></li><li><p class="paragraph" style="text-align:left;">Go: 217</p></li></ul></li><li><p class="paragraph" style="text-align:left;">299 total bugs</p><ul><li><p class="paragraph" style="text-align:left;">Python: 216 </p></li><li><p class="paragraph" style="text-align:left;">Java: 48</p></li><li><p class="paragraph" style="text-align:left;">Go: 35 (no notes for why Go was suddenly included)</p></li></ul></li><li><p class="paragraph" style="text-align:left;">55 high severity bugs (language breakdown wasn’t available 🤔)</p></li></ul><p class="paragraph" style="text-align:left;">One disappointing note is that I’ve only come across two published security advisories for the submitted bugs. </p><ol start="1"><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25123?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE-2024-25123 </a>for <a class="link" href="https://github.com/Open-MSS/MSS?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open-MSS/MSS</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27097?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE-2024-27097</a> for <a class="link" href="https://github.com/ckan/ckan?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">ckan</a></p></li></ol><p class="paragraph" style="text-align:left;">It begs the question, was it worth it? But I can’t answer that 😄. With the limited information I’ve reviewed, I’d argue that yes it was worth it, but only as an experiment. For now we know that it isn’t worth it. What feels apparent is that the scope should’ve been more carefully considered and defined. E.g., Which top 10,000 projects? At what point in time were the downloads compared? What download counts were used, and when did that evaluation occur? Which version of these projects was OpenRefactory to scan? The latest on GitHub? The latest official release? All stable releases? </p><p class="paragraph" style="text-align:left;"><i>In January 2024: the notes specified versions to assess “We will concentrate on the last five release branches of each of the projects.”</i></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-92-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=c68ee378-9c5b-45c9-ae63-3bcfef3db39f&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #91: Weekly Cybersecurity Newsletter!</title>
  <description>GitHub Immutable Releases, Deptective, Cloudflare monetizing web crawling, historic data on software supply chain attacks, Belgium is unsafe for CVD</description>
  <link>https://www.cramhacks.com/p/cramhacks-91</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-91</guid>
  <pubDate>Wed, 09 Jul 2025 18:14:40 +0000</pubDate>
  <atom:published>2025-07-09T18:14:40Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">My brain has grown 10x in these past few weeks. I love learning through reading, but it simply can’t replace hands-on-keyboard time. Lately I’ve been doing exactly that; leveling up my understanding of observability, databases, kubernetes, and more. I used to dread spending countless hours on a dumb bug, but with time I’ve come to recognize how much I’ve learned from each of those moments.</p><p class="paragraph" style="text-align:left;">Thank you <a class="link" href="https://socket.dev/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Socket</a> for sponsoring CramHacks! They’ve long been a market leader in my eyes in regard to detecting malicious packages. My suspicion is that the same can be said for their vulnerability detection and prioritization; especially given their recent <a class="link" href="https://socket.dev/blog/socket-acquires-coana-press-release?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Coana acquisition</a>.</p><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><a class="image__link" href="https://socket.dev/features/github?utm_source=cramhacks&utm_medium=email&utm_campaign=app&utm_id=2025-7" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2c99853e-3858-417b-b4b1-e999294b5716/Socket-Ad-CramHacks.png?t=1751985430"/></a></div><p class="paragraph" style="text-align:left;">Socket is the easiest security tool you’ve ever used — trusted by 8,500+ organizations. <a class="link" href="https://socket.dev/features/github?utm_source=cramhacks&utm_medium=email&utm_campaign=app&utm_id=2025-7" target="_blank" rel="noopener noreferrer nofollow" style="color: #ff00c2">Install the free app</a> with zero setup, or <a class="link" href="https://socket.dev/demo?utm_source=cramhacks&utm_medium=email&utm_campaign=demo&utm_id=2025-7" target="_blank" rel="noopener noreferrer nofollow" style="color: #ff00c2">book a demo</a> today.</p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.linkedin.com/feed/update/urn:li:activity:7348231481292394497/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub is launching Immutable Releases in private preview</a></b><br>The Package Security team is getting ready to ship Immutable Releases in private preview later this month. Both the tag and the release itself will be protected via this repository and/or org-level setting. Each immutable release will also include an auto-generated <a class="link" href="https://github.com/in-toto/attestation/blob/main/spec/predicates/release.md?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">in-toto release attestation</a> signed by GitHub and verifiable via <a class="link" href="https://cli.github.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GH CLI</a>. </p><p class="paragraph" style="text-align:left;">👋 I joined GitHub for the simple fact that one small feature can have an unfathomable impact on software supply chain security. Immutable Releases was well underway by the time I joined, but it brings me so much fulfillment to play a (very small) role in shipping this to users. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.trailofbits.com/2025/07/08/investigate-your-dependencies-with-deptective/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Investigate your dependencies with Deptective</a></b><br>Trail of Bits has released an open-source tool for running software when dependencies when you have no idea what shared libraries it needs. It does this by tracing the program, identifying errors, searching the Linux distribution’s index to find packages containing the desired files, and installing them. The cycle then repeats and backtracks if needed. <a class="link" href="https://github.com/trailofbits/deptective?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Repo</a></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.cloudflare.com/press-releases/2025/cloudflare-just-changed-how-ai-crawlers-scrape-the-internet-at-large/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Cloudflare Just Changed How AI Crawlers Scrape the Internet-at-Large; Permission-Based Approach Makes Way for A New Business Model</a></b><br>As of July 1st, Cloudflare has introduced a permission-based approach allowing customers to dictate which AI bots are authorized to crawl their site, with the option to monetize the authorization. Cloudflare is also working to better identify and authenticate the identity of bots, while categorizing them based on behavior (e.g., used for training, inference, or search). </p><p class="paragraph" style="text-align:left;">👋 This is the most excitement I’ve seen from Cloudflare in ages. Especially with their recent launch of containers in Cloudflare Workers. They’re seemingly positioning themselves really well to be an AI powerhouse for the internet. But maybe I’m being brainwashed by marketing hype 🤫.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/tstromberg/supplychain-attack-data?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Data about all known supply-chain attacks through history</a></b><br>Thomas Strömberg has shared the data behind his CackalackyCon talk which contains details in YAML for 59 OSS incidents and 45 proprietary software incidents. The data identifies malware injection points and determined that less than 22% of incidents compromised the actual source code of the project. </p><p class="paragraph" style="text-align:left;">👋 Thomas previously worked at Chainguard, and I suspect this research played a role in motivating them to begin building OSS packages from source. Thomas is also building a startup and is <a class="link" href="https://www.linkedin.com/posts/activity-7346231113339559936-O0Co?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQ8nOYB-qxZUjIl66dUCIFWaQoX1cd2l6U" target="_blank" rel="noopener noreferrer nofollow">sharing regular content</a> about the journey on LinkedIn! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://xbow.com/blog/top-1-how-xbow-did-it/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The road to Top 1: How XBOW did it</a></b><br>👋<b> </b>I think XBOW is doing great work, but I also think them temporarily being #1 on the HackerOne leaderboard is not as huge as people are making it out to be. They’ve raised nearly $120M in the last year; if you’re using HackerOne leaderboards to measure success, you better damn be number 1.</p><p class="paragraph" style="text-align:left;">A different takeaway. . . They submitted &gt;1,000 bugs in Q1 2025, 208 were marked as duplicates and 209 as informative. Assuming these are all legitimate vulnerabilities, imagine how frustrating this would be if they were manually found and reported 🫠. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://offensivebytes.com/attackers-love-your-yaml-static-kubernetes-security-analysis?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Attackers Love Your YAML: Static Kubernetes Security Analysis for DevSecOps</b></a><br><a class="link" href="https://www.linkedin.com/in/rushikeshpatil01/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Rushikesh Patil</a> details common dangerous misconfigurations, real-world incidents, and suggests some prominent security linters for kubernetes manifest scanning.</p><p class="paragraph" style="text-align:left;">👋 I’ve been getting in kubernetes lately and I was amazed by how quickly I could be dangerous with using it. That said, best practices aren’t abundantly obvious, and I suspect the average non-k8s expert is highly likely to introduce unnecessary risk. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://floort.net/posts/belgium-unsafe-for-cvd/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Belgium is unsafe for CVD</a></b><b> & </b><a class="link" href="https://devae.re/posts/belgian-cvd-is-deeply-broken/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Belgian CVD is deeply broken</b></a><br><a class="link" href="https://www.linkedin.com/in/floort/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Floor Terra</a> & <a class="link" href="https://www.linkedin.com/in/devaere/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Piet De Vaere</a> each published a blog post about their experience and concerns with how Belgian handles CVD (Coordinated vulnerability disclosure). It’s worth a read, but the tl;dr is that vulnerability disclosure per Belgian law mandates disclosure within 24 hours and lifelong secrecy of the issue. The disclosure also requires providing an official government identity document.</p><p class="paragraph" style="text-align:left;">👋 In Piet’s blog, you really get a sense for how the Centre for Cybersecurity Belgium (CCB) handles these disclosures. There’ve been multiple reports of the CCB threatening legal action during responsible disclosures 🤔.</p><h2 class="heading" style="text-align:left;" id="un-open-source-week-2025">UN Open Source Week 2025</h2><p class="paragraph" style="text-align:left;">8+ hours of discussion during UN Open Source Week. If you’re into that kind of stuff, this is for you 🫡. I hope to listen to it throughout the upcoming week. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://webtv.un.org/en/asset/k1v/k1vq934jz6?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Digital Public Infrastructure Day (DPI Day), part 1</b></a></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://webtv.un.org/en/asset/k1s/k1sdg8oy7y?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Digital Public Infrastructure Day (DPI Day), part 2</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://webtv.un.org/en/asset/k1i/k1i8jasxz4?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open Source Programme Offices (OSPOs) for Good, part 1</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://webtv.un.org/en/asset/k10/k10wm2b8nu?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open Source Programme Offices (OSPOs) for Good, part 2</a></b></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-91-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=35fe52ce-fba6-4c3e-87bb-4c04ff2bbcce&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #90: Weekly Cybersecurity Newsletter!</title>
  <description>Compromising the extension store used by Cursor &amp; Windsurf, GitHub Advisory DB insights, leveraging GitHub Events to expose secrets, OpenSSF Japan</description>
  <link>https://www.cramhacks.com/p/cramhacks-90</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-90</guid>
  <pubDate>Wed, 02 Jul 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-07-02T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">Time to start planning for DEF CON! Excited to be giving a talk at AppSec Village covering the current state of open source package vulnerabilities, ongoing efforts to improve coverage, and the challenges + shortcomings of today’s programs.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/99c099ee-0d91-4e90-b81a-9034170600b1/Kelly_-_Scaling_Bug_Hunting_in_Open_Source_Software_943106.jpeg?t=1751190249"/></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">How We Could’ve Taken Over Every Developer Using a VSCode Fork</a></b><br><a class="link" href="https://www.linkedin.com/company/extensiontotal/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Koi Security</a> researcher <a class="link" href="https://www.linkedin.com/in/orenyomtov/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Oren Yomtov</a> discloses how he compromised the entire Open VSX extensions marketplace. In short, the marketplace leverages a <a class="link" href="https://github.com/EclipseFdn/publish-extensions/actions/workflows/publish-extensions.yml?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Actions Workflow</a> to build and publish all extensions on a nightly basis. Because these steps were not isolated, malicious npm build scripts would have access to the secret used for publishing extensions 👀. Koi Security abused exactly this, and successfully exfiltrated the secret, a super-admin credential.</p><p class="paragraph" style="text-align:left;">👋 “<a class="link" href="https://github.com/eclipse/openvsx?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open-VSX</a> is a vendor-neutral open-source alternative to the Visual Studio Marketplace.” I feel like this incident has gone somewhat under the radar, maybe because people are less familiar with Open-VSX. But it’s now used by editors such as Cursor and Windsurf. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/security/github-advisory-database-by-the-numbers-known-security-vulnerabilities-and-what-you-can-do-about-them/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Advisory Database by the numbers</a></b><br>Straight from the source, GitHub Security Analyst <a class="link" href="https://www.linkedin.com/in/jonathan-evans-240b9321/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jonathan Evans</a> analyzes trends in the Advisory Database such as its growth, advisory sources, and ecosystem coverage. The blog also offers insights into GitHub’s CVE contributions as the 5th largest CNA, contributing to more than 2,000 CVEs in 2024.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/84e0f75e-2a15-4cbd-93c1-c5c031ffcd79/image.png?t=1751191123"/><div class="image__source"><span class="image__source_text"><p><a class="link" href="https://github.blog/security/github-advisory-database-by-the-numbers-known-security-vulnerabilities-and-what-you-can-do-about-them/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub advisory Database distribution by ecosystem</a></p></span></div></div><p class="paragraph" style="text-align:left;">👋 Jonathan included a table for ecosystem coverage which breaks up total advisories and affected packages; this is where I personally have a lot of concerns. For instance, Maven has 5171 total advisories, but those only relate to 955 unique packages. Similarly for Python, only 1044 unique packages have one or more advisories. Developers are drowning in security alerts when we’ve only barely scratched the surface of open source package vulnerabilities. Almost no one cares to improve this.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets</a></b><br>Another interesting use case for the public GitHub Event Log. People often attempt to delete commits containing secrets and leverage force-pushes to cover up the git history; but if you have the commit hash you can still access the commit. So <a class="link" href="https://www.linkedin.com/in/sharonbrizinov/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Sharon Brizinov</a> scanned every force push event since 2020 and uncovered lots of secrets.</p><p class="paragraph" style="text-align:left;">👋 The <a class="link" href="https://www.gharchive.org/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">gh archive project</a> maintains snapshots of GitHub Event Logs.</p><h2 class="heading" style="text-align:left;" id="open-ssf-community-day-japan"><b>OpenSSF Community Day - Japan</b></h2><p class="paragraph" style="text-align:left;">Presentations have been uploaded to <a class="link" href="https://www.youtube.com/@OpenSSF/videos?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OpenSSF’s YouTube channel</a>. Here are my notes for a few of the talks! </p><h3 class="heading" style="text-align:left;" id="what-is-this-package-even-doing-ana"><a class="link" href="https://www.youtube.com/watch?v=63Tr3C9CjmU&t=935s&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">What Is This Package Even Doing? Analyzing Behaviors of Our Software Dependencies - Isaac Dawson</a></h3><p class="paragraph" style="text-align:left;">Isaac breaks down the <a class="link" href="https://gitlab.com/gitlab-oss-package-research/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitLab Open Source Package Research</a> (OSSPR) project and how they analyze behaviors of open source packages at scale. </p><ul><li><p class="paragraph" style="text-align:left;">The output of tools are tagged the same as the package version and pushed to a repo, using git versioning made the most sense given most of a package’s code remains intact between versions. </p></li><li><p class="paragraph" style="text-align:left;">The tool <a class="link" href="https://gitlab.com/gitlab-oss-package-research/tools/libbehave?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">libbehave</a> leverages +130 semgrep rules per language and is looking for suspicious network requests, code execution, serialization, what frameworks are being used, and more.</p></li><li><p class="paragraph" style="text-align:left;">Analysis was completed for 7,245 unique packages with 930,990 total version combinations.</p><ul><li><p class="paragraph" style="text-align:left;">50% of packages leverage some form of Code/OS Execution</p></li></ul></li></ul><p class="paragraph" style="text-align:left;">I’m a big fan of behavioral analysis for software packages, however Isaac proved just how difficult this can be. With Isaac’s tooling, there were nearly 140 Million findings for the 7,245 packages.</p><h3 class="heading" style="text-align:left;" id="the-migration-to-post-quantum-crypt"><a class="link" href="https://www.youtube.com/watch?v=IRcU0SRQeKQ&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The Migration To Post-Quantum Cryptography: Open-Source Innovations and Interoperability - Tony Chen</a></h3><p class="paragraph" style="text-align:left;">Tony recaps post-quantum cryptography (PQC) and the expected timeline. This includes ML-DSA, ML-KEM (and HQC as the declared backup algorithm), and SLH-DSA. As for timelines, NIST is leading the discussion and has declared 2030 as the target year for deprecation of RSA/ECC. Australia has also announced 2030, but for RSA, SHA-256, ECDSA, and ECDH. The UK is targeting 2035 for full migration to PQC.</p><p class="paragraph" style="text-align:left;">Keyfactor maintains a list for completed and planned tests for <a class="link" href="https://docs.keyfactor.com/ejbca/latest/interoperability-and-future-ready-cryptography?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">interoperability & future-ready cryptography</a>.</p><p class="paragraph" style="text-align:left;">Tony then demos using OpenSSL to generate a ML-DSA CSR, issuing a certificate using an EST endpoint, and verifying the certificate using OpenSSL. The demo furthers into signing and verifying of a file. </p><h3 class="heading" style="text-align:left;" id="true-security-unforgeable-baseline-"><a class="link" href="https://www.youtube.com/watch?v=_Na_R1IY-5c&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">True Security: Unforgeable Baseline Compliance - Adolfo García Veytia, Carabiner Systems</a></h3><p class="paragraph" style="text-align:left;">Puerco discusses the OSPS Baseline which is made up of ~45 controls and are intended to be realistic for even solo maintainers. The next challenge is generating a claim that states the project satisfies the baseline controls. Puerco proposes leveraging the In-Toto attestation framework and the Sigstore transparency log to generate unforgeable OSPS Baseline compliance through attested evidence. </p><p class="paragraph" style="text-align:left;">As shown, this can be done via generating SLSA source attestations, vulnerability scan result attestations, SBOM attestations, security insights attestations, etc. for commits. Finally a SLSA build attestation can be generated; this will contain the commit for building the artifact, which can be used to link to the other attestations generated. </p><p class="paragraph" style="text-align:left;">Puerco is working on a project, <a class="link" href="https://github.com/carabiner-dev/ampel?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">ampel</a>, “a lightweight supply chain policy engine designed to be embedded across the software development lifecycle to make sure that source code, tools and the build environment can be trusted by verifying unforgeable metadata captured in signed attestations.” 👀 </p><p class="paragraph" style="text-align:left;">The future is full of attestations! 🙏 </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-90-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=f2de256d-1048-40b4-b514-2d1cd5578838&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #89: Weekly Cybersecurity Newsletter!</title>
  <description>Google Donates A2A, GH Attestation OPA Gatekeeper Support, Malicious Transitive Dependencies, Kingfisher Secret Detection, Edara &amp; Container Security</description>
  <link>https://www.cramhacks.com/p/cramhacks-89</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-89</guid>
  <pubDate>Wed, 25 Jun 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-06-25T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">Several people reached out last week to tell me the newsletter said “Happy Monday.” </p><p class="paragraph" style="text-align:left;">Story time: On the week’s most dreaded day, Friday, I found myself surrounded by coworkers greeting one-another with a “Happy Friday.” </p><p class="paragraph" style="text-align:left;">I thought to myself, <i>What is so good about Friday?</i> The room went dark. Project ideas flashed before my eyes. Open issues taunted me. I realized that nothing could be worse than the weekend that soon plagued the team. That’s when it hit me, <i>Monday is the day we should be celebrating, not this Friday thing. </i></p><p class="paragraph" style="text-align:left;">From that point on, I declared that every day would be a Monday. So Happy Monday!</p><p class="paragraph" style="text-align:left;"><i>The healthier? version is that Mondays tend to suck, so let’s just call them Happy to trick our brain.</i></p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/changelog/2025-06-23-enforce-admission-policies-with-artifact-attestations-in-kubernetes-using-opa-gatekeeper/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OPA Gatekeeper provider for GitHub Artifact Attestations</a></b><br>Now in public preview, GitHub has released an open-source <a class="link" href="https://github.com/github/artifact-attestations-opa-provider?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">external data provider for OPA Gatekeeper</a> to enable policy evaluation based on an <a class="link" href="https://docs.github.com/en/actions/security-for-github-actions/using-artifact-attestations/using-artifact-attestations-to-establish-provenance-for-builds?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">image&#39;s signed SLSA build provenance</a>.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://developers.googleblog.com/en/google-cloud-donates-a2a-to-linux-foundation/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Google Cloud donates A2A to Linux Foundation</a></b><br>The Linux Foundation has announced the Agent2Agent project with partners: AWS, Cisco, Google, Microsoft, Salesforce, SAP, and ServiceNow. </p><p class="paragraph" style="text-align:left;">👋 MCP is everywhere, but I’ve seen very little buzz about A2A. That said, MCP is pretty barebones and full of security issues. Will A2A be the “next-gen MCP?”</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://endowment.dev/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The Open Source Endowment Foundation, a US nonprofit corporation</a></b><br>The world’s first open source endowment whose core team consists of <a class="link" href="https://www.linkedin.com/in/kvinogradov/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Konstantin Vinogradov</a>, <a class="link" href="https://www.linkedin.com/in/chadwhitacre/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Chad Whitacre</a>, <a class="link" href="https://www.linkedin.com/in/maxim/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Maxim Konovalov</a>, <a class="link" href="https://www.linkedin.com/in/jonathan-starr-b04032284/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jonathan Starr</a>, <a class="link" href="https://www.linkedin.com/in/amy3parker/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Amy Parker</a>, and <a class="link" href="https://vlad.website/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Vlad-Stefan Harbuz</a>. Konstantin has a blog post <a class="link" href="https://kvinogradov.com/oss-universities/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">What Open Source can learn from universities to fix its funding</a> which discusses why they chose an endowment model.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://socket.dev/blog/monkey-patched-pypi-packages-steal-solana-private-keys?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Monkey-Patched PyPI Packages Steal Solana Private Keys</b></a> <br>Socket’s <a class="link" href="https://www.linkedin.com/in/kirillboychenko/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Kirill Boychenko</a> shares why a malicious package was created, with no intention for anyone to use it directly. A package was created with a malicious <code>__init__.py</code>, but the objective was actually for people to install one of the five other packages created, which depend-on the malicious one. Therefore, during installation of the package, the transitive dependency would be introduced, and the malicious setup script executed, monkey-patching critical constructors that generate Solana Private Keys. </p><p class="paragraph" style="text-align:left;">👋 Cryptocurrencies have been under siege by supply chain attacks since the beginning, but Socket is uncovering some very cool vectors. Arguably the most sophisticated attacks in the space (that are known).</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.mongodb.com/blog/post/product-release-announcements/introducing-kingfisher-real-time-secret-detection-validation?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Introducing Kingfisher: Real-Time Secret Detection and Validation</a></b><br>MongoDB released Kingfisher, an open-source project that is “a blazingly fast secret‑scanning and validation tool built in Rust.” </p><p class="paragraph" style="text-align:left;">👋 I haven’t tested this or spoke to anyone that has, but it does seem “blazingly fast” based on the metrics. I also see it supports secrets validation and writing custom rules. Seems promising tbh. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://thenewstack.io/what-we-wish-we-knew-about-container-security/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">What We Wish We Knew About Container Security</a></b><br><a class="link" href="https://www.linkedin.com/in/mauilion/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Duffie Cooley</a> and <a class="link" href="https://www.linkedin.com/in/jedsalazar/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jed Salazar</a> discuss container isolation, and the illusion of separation despite a shared kernel. By leveraging lightweight virtual machines, containers can be isolated even at the kernel level, with additional overhead being minimal thanks to advancements in the space. </p><p class="paragraph" style="text-align:left;">👋 Jed Salazar is the field CTO at <a class="link" href="https://edera.dev/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Edara</a>, a company I’ve been following since <a class="link" href="https://www.linkedin.com/in/ariadneconill/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Ariadne Conill</a> announced their launch. When <a class="link" href="https://github.com/apple/container?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">apple/container</a> was released, Edara published an explainer for <a class="link" href="https://docs.edera.dev/concepts/vm-containers/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">VM-per-container</a> which mentions how they (and now Apple) leverage a dedicated VM per container. Side note, I’m really excited about Edara and you probably should be too. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.praetorian.com/blog/introducing-github-device-code-phishing/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Introducing: GitHub Device Code Phishing</a></b><br>Praetorian’s <a class="link" href="https://www.linkedin.com/in/john-stawinski-72ba87191/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">John Stawinski</a>, <a class="link" href="https://www.linkedin.com/in/mas0nd/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Mason Davis</a>, and <a class="link" href="https://www.linkedin.com/in/matthew-jackoski/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Matt Jackoski</a> detail how they abuse GitHub’s OAuth2 device flow during engagements. Device flow is when GitHub provides a token on one device, and you enter that token in an authenticated session on another device to grant access. Once granted, the device is now authorized to retrieve an OAuth token on behalf of the user. Pwned.</p><p class="paragraph" style="text-align:left;">👋 People always think social engineering requires someone to provide their username and password, but that’s definitely not the case. It’s much easier to trick a user to provide a pin, especially when you direct them to legitimate URLs. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.cloudflare.com/containers-are-available-in-public-beta-for-simple-global-and-programmable/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Cloudflare Containers are available in public beta</a></b><br>👋 This is for paid customers only. Besides the obvious use cases, the article suggests that people want to execute LLM-generated code in a sandboxed container. As are most AI things, this is a bit terrifying. But imagine building a barebones container, having a webpage with nothing but a prompt, and users being able to prompt there way to building an entire webapp, via prompts, all within that container 😎. I have no idea why you’d want to do this, but it sounds cool. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.openwall.com/lists/oss-security/2025/06/24/1?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Python - Tarfile Realpath Overflow Vulnerability</a></b><br>Four CVEs have been assigned to Tarfile and SCA tools are going to go nuts with false positives. The vulnerabilities affect TarFile.extractall() and TarFile.extract(), primarily when setting filter=&quot;data&quot;, or filter=&quot;tar&quot;. However, filter=”data” became the default in Python version 3.14. </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-89-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=5df5736b-493b-41ff-a818-500893510abb&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #88: Weekly Cybersecurity Newsletter!</title>
  <description>Docker Hub webhook security, libxml2&#39;s bug management, GerriScary&#39;s Google vulnerability, Netflix&#39;s dependency confusion, and CVE scoring</description>
  <link>https://www.cramhacks.com/p/cramhacks-88</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-88</guid>
  <pubDate>Wed, 18 Jun 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-06-18T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">I hope you’re having a great week thus far. I woke up at 3am today, worked for 30 minutes, realized how ridiculous that was, and then went back to bed. No impending deadline, just kinda happened for no good reason. I’ll be disconnecting this weekend 😅.</p><hr class="content_break"><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Are You Patching KEVs That Can&#39;t Actually Hurt You?</b></p><p class="paragraph" style="text-align:left;">CISA’s KEV list flags known exploited vulns, but not all of them can impact your environment.</p><p class="paragraph" style="text-align:left;"><b>OX’s latest research reveals why blindly patching every KEV is a waste of time — and what to do instead.</b></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://hubs.li/Q03sbNLz0?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Download Now</a></p><div class="image"><a class="image__link" href="https://hubs.li/Q03sbNLz0?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8b7731f9-9f4f-41e4-a5e4-83e8cbefb105/image.png?t=1750190246"/></a></div></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/docker/roadmap/issues/51?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open Issue: Use a Secret in Docker Hub Webhooks for Caller validation</a></b><br>Scrolling LinkedIn, I noticed <a class="link" href="https://www.linkedin.com/in/imjasonh/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jason Hall</a>, Principal Engineer @ Chainguard, pointing out that Docker Hub webhooks don’t offer any method for validating a request’s origin (e.g., via a secret). This issue has been open since March 2020. Wild that they haven’t offered this or even publicly commented on it, AFAICT. </p><p class="paragraph" style="text-align:left;">👋 Ironically, this was a comment on <a class="link" href="https://www.linkedin.com/in/mattmoor/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Matt Moore’s</a> (CTO @ Chainguard) LinkedIn post suggesting that GitHub should move away from including a long-lived token in webhook requests and instead use an OIDC token. I’m 100% onboard with getting rid of long-lived tokens wherever possible. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/913?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">libxml2: Triaging security issues reported by third parties</a></b><br>Maintainer <a class="link" href="https://gitlab.gnome.org/nwellnhof?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Nick Wellnhofer</a> shares their experience as an open source maintainer and managing security reports, ultimately deciding that security issues should be treated like any other bug — making it public immediately, and fixing it as time allows.</p><p class="paragraph" style="text-align:left;">Nick also shares in a comment, <i>“The point is that </i><b><i>libxml2 never had the quality to be used in mainstream browsers or operating systems to begin with.</i></b><i> It all started when Apple made libxml2 a core component of all their OSes. Then Google followed suit and now even Microsoft is using libxml2 in their OS outside of Edge. This should have never happened.”</i></p><p class="paragraph" style="text-align:left;">👋 I always appreciate these from-the-heart threads from active maintainers. It pains me to hear about the challenges, but I don’t think most people know what these struggles look like, and so we need more discussions like this. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.tenable.com/blog/gerriscary-hacking-the-supply-chain-of-popular-google-products-chromiumos-chromium-bazel-dart?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GerriScary: Hacking the Supply Chain of Popular Google Products</a></b><br><a class="link" href="https://www.linkedin.com/in/liv-matan/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Liv Matan</a> does it again, discovering a vulnerability that could’ve been abused to compromise of at least 18 Google projects including ChromiumOS, Chromium, Bazel, Dart and Bazel.</p><p class="paragraph" style="text-align:left;">Dubbed GerriScary, the vulnerability was the result of misconfigurations in how project’s used Google’s Gerrit code-collaboration platform. The abused configurations are detailed <a class="link" href="https://www.tenable.com/blog/gerriscary-hacking-the-supply-chain-of-popular-google-products-chromiumos-chromium-bazel-dart?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter#:~:text=Full%20chain%20explanation" target="_blank" rel="noopener noreferrer nofollow">here</a>, and essentially enabled users to make commits on approved changes, without requiring a review before submission.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.landh.tech/blog/20250610-netflix-vulnerability-dependency-confusion/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Netflix Vulnerability: Dependency Confusion in Action</a></b><br><a class="link" href="https://www.linkedin.com/in/roni-carta/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Roni Carta</a> and <a class="link" href="https://shubs.io/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Shubs</a> obtained remote code execution on a Netflix-owned host by processing bundled javascript in browser traffic to identify components vulnerable to dependency confusion. Once a vulnerable target was found, they published a proof-of-concept payload and waited for a ping back.</p><p class="paragraph" style="text-align:left;">👋 The use of HAR files is super cool! If you don’t already know both Roni and Shubs, you probably should.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://vulngrade.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Scoring the quality of CVE vulnerability descriptions</a></b><br><a class="link" href="https://www.linkedin.com/in/dawid-czarnecki/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Dawid Czarnecki</a> launched a “no login required” web app for scoring CVE descriptions based on <a class="link" href="http://CVE.org?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE.org</a>’s phrasing guidelines. </p><p class="paragraph" style="text-align:left;">👋 <a class="link" href="https://www.linkedin.com/in/scottmoore4/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Scott Moore</a> maintains a similar scoring system that evaluates historic CVE submissions, by CNA. Per <a class="link" href="https://www.scottmoore.net/cna-ranking/index.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Scott’s data</a>, in 2025, only 750 CVEs disclosed (out of 21590) have reported all three standards: CWE, CVSS, and CPE.</p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-88-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=3abf3105-b95a-42dd-800f-4f8ae12d0935&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #87: Weekly Cybersecurity Newsletter!</title>
  <description>Apple Containerization, No output from your MCP server is safe, GitHub Release Assets now have digests, 16+ npm packages compromised from leaked secrets</description>
  <link>https://www.cramhacks.com/p/cramhacks-87</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-87</guid>
  <pubDate>Wed, 11 Jun 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-06-11T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">I hope you’re having a great week thus far! I’ve been getting woken up every night by our cats and it has been exhausting. Not making today any easier, as I have ~5 hours of driving to do for <a class="link" href="https://planetcybersec.com/061125-conference/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">AppSec SoCal</a>, which is in Santa Monica.</p><hr class="content_break"><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Angular 17 reached end-of-life on May 15, 2025. Keep your applications running smoothly without rushing your migration timeline. Let us secure your open source framework and stay protected. <b><a class="link" href="https://www.herodevs.com/support?utm_source=cramhacks&utm_medium=newsletter+&utm_campaign=CramHacks&utm_id=CramHacks" target="_blank" rel="noopener noreferrer nofollow" style="color: #ff0000">Contact HeroDevs today.</a></b></p><div class="image"><a class="image__link" href="https://www.herodevs.com/support?utm_source=cramhacks&utm_medium=newsletter+&utm_campaign=CramHacks&utm_id=CramHacks" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/89a793ef-d6ff-491b-b43c-680b9957bb8c/Never-Ending_Support_for_Deprecated_Open_Source_Frameworks_-_2.png?t=1749523255"/></a></div></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/apple/containerization?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Apple releases Containerization: run Linux containers on macOS</b></a><br>👋 I haven’t had a chance to play with this yet, but I love me a native experience. I think a lot of folks are right in that this will also benefit Docker and OrbStack users if and when they adopt this. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.cyberark.com/resources/threat-research-blog/poison-everywhere-no-output-from-your-mcp-server-is-safe?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Poison everywhere: No output from your MCP server is safe</a></b><br>CyberArk Researcher <a class="link" href="https://www.linkedin.com/in/simcha-k/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Simcha Kosman</a> details Tool Poisoning Attack (TPA), Full-Schema Poisoning (FSP), and Advanced Tool Poisoning Attacks (ATPA).</p><p class="paragraph" style="text-align:left;">👋 Finding security risks in MCP Server implementations must feel a lot like finding vulnerabilities in Windows 95. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.blog/changelog/2025-06-03-releases-now-expose-digests-for-release-assets/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>GitHub Releases now expose digests for release assets</b></a><br>If you’ve created a release on GitHub recently you may have noticed that assets now display their SHA256 checksums, which are generated at upload. The digests are accessible via the Releases REST API, GraphQL API, and the <code>gh release view</code> command. </p><p class="paragraph" style="text-align:left;">👋 This is just one of the many milestones for the <a class="link" href="https://github.com/github/roadmap/issues/1138?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Immutable Releases</a> project! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.aikido.dev/blog/supply-chain-attack-on-react-native-aria-ecosystem?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Aikido: 16 React Native Packages for GlueStack Backdoored Overnight</a></b><br>Security Researcher <a class="link" href="https://www.linkedin.com/in/charlie-eriksen-a318578/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Charlie Eriksen</a> details the malware injected into more than 16 npm packages which combined receive more than one million downloads per week.</p><p class="paragraph" style="text-align:left;">👋 I poked around at this for a few minutes. My hypothesis, is that the npm user gluestackadmin, who is a maintainer for each of these packages, was compromised due to a leaked secret in a GH workflow. Only hours ago, Sysdig Security Researcher <a class="link" href="https://www.linkedin.com/in/stefano-chierici-52047984/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Stefano Chierici</a> opened an issue in the gluestack-ui repository, <a class="link" href="https://github.com/gluestack/gluestack-ui/issues/2900?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">reporting a vulnerability</a>. I was hesitant to share this, but mind you this took me &lt;15 minutes to find myself. npm trusted publishing can’t come soon enough!!</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/blog/small-language-model-for-secrets-detection-in-code?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Wiz: How We Fine-Tuned a Small Language Model for Secret Detection in Code</a></b><br>AI Researchers <a class="link" href="https://www.linkedin.com/in/erez-harush/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Erez Harush</a> and <a class="link" href="https://www.linkedin.com/in/daniel-lazarev/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Daniel Lazarev</a> details why and how they’ve fine-tuned a small language model (Llama 3.2 1B) for detecting secrets in code. </p><p class="paragraph" style="text-align:left;">👋 They also gave a talk on this topic at <a class="link" href="https://www.youtube.com/live/9Dw1FtT6ijo?t=1500s&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">BSides SF</a>! It was neat to learn some of the design decisions and trade-offs. I wonder how many startups will fail because they don’t adopt or build more efficient models.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://openai.com/global-affairs/disrupting-malicious-uses-of-ai-june-2025/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>OpenAI - Disrupting malicious uses of AI: June 2025</b></a><br>Since OpenAI’s last report three months ago, their investigative teams have uncovered cases of ChatGPT accounts being used for social engineering, cyber espionage, deceptive employment schemes, covert influence operations, and scams. The full report details ten case studies, four of which are reported to originate from China. Each details the Actor, Behavior, Completions, and Impact of the activity. </p><p class="paragraph" style="text-align:left;">👋 This is hilarious: <i>“One user stated in a prompt that they worked for the Chinese Propaganda Department.” </i>This wasn’t verified by OpenAI, but even so, it’s funny and I hope it’s legitimate. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Trump Amends Cybersecurity Executive Orders 13694 & 14144</a></b><br>👋 Relevant <a class="link" href="https://www.whitehouse.gov/fact-sheets/2025/06/fact-sheet-president-donald-j-trump-reprioritizes-cybersecurity-efforts-to-protect-america/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">“fact sheet”</a> — you’re on your own to read this one. It’s near impossible to know if any of this even matters, so I’m saving my breath 😅.</p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-87-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=a2e451ff-3b1e-42d3-a532-182ac1c5a516&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #86: Weekly Cybersecurity Newsletter!</title>
  <description>Trusted Publishing for NPM, Likely Exploited Vulnerabilities (LEV), Correctness of SBOM Generation, Scalable Dynamic Malware Analysis for packages</description>
  <link>https://www.cramhacks.com/p/cramhacks-86</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-86</guid>
  <pubDate>Wed, 04 Jun 2025 17:44:35 +0000</pubDate>
  <atom:published>2025-06-04T17:44:35Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #0CAFEF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0CAFEF; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">I’ve been going a bit overboard on the caffeine lately. I’ve also been processing a ridiculous amount of information thanks to writing this newsletter and my desperate need to know every little thing that happens in this industry. </p><p class="paragraph" style="text-align:left;">This past week has undoubtedly been productive, but I’m very much looking forward to sitting at the beach and probably surfing 🏄‍♂️.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">Excited to be speaking at <a class="link" href="https://planetcybersec.com/061125-conference/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Planet Cyber Sec AppSec SoCal</a> next week 🥳!</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/eff99178-2730-490c-828c-6730665a7fe0/Speakers_v6_061125.jpg?t=1749058606"/></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.cs.ucr.edu/~heng/pubs/sbom-dsn24.pdf?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Correctness of SBOM Generation: A Differential Analysis Approach</a></b><br>A study comparing SBOMs generated by Trivy, Syft, Microsoft’s sbom-tool, and GitHub’s dependency graph. The research included SBOMs from 7,876 open-source projects written in Python, Ruby, PHP, Java, Swift, C#, Rust, Golang and JavaScript — then conducting a differential analysis of results. </p><p class="paragraph" style="text-align:left;">👋 To no surprise, the results were inconsistent and not great for confidence in SBOMs. That said, the research used dated technologies. For instance, it used <a class="link" href="https://github.com/aquasecurity/trivy/releases/tag/v0.43.0?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Trivy v0.43</a> which was released in June 2023—other tool versions used also reflect June 2023 releases.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.youtube.com/playlist?list=PLWfD9RQVdJ6cm3kSvz-Sk87CawSzn5Ep0&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE/FIRST VulnCon 2025 Videos Releases</a></b><br>Almost 100 videos covering everything from the current state of vulnerability management, future predictions, and research on the effectiveness of methodologies.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/orgs/community/discussions/161015?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Coming Soon: OpenID Connect (OIDC) Support for npm Registry</b></a><br>npm has announced that public beta for <a class="link" href="https://github.com/ossf/wg-securing-software-repos/blob/main/docs/trusted-publishers-for-all-package-repositories.md?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Trusted Publishing</a> is coming (tentatively) in July 2025, joining the likes of <a class="link" href="https://blog.pypi.org/posts/2023-04-20-introducing-trusted-publishers/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">PyPI</a>, <a class="link" href="https://blog.rubygems.org/2023/12/14/trusted-publishing.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">RubyGems</a>, and <a class="link" href="https://dart.dev/tools/pub/automated-publishing?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Dart’s Pub.dev</a>. This leverages OIDC tokens generated during CI/CD workflows to authenticate directly with the registry.</p><p class="paragraph" style="text-align:left;">👋 For those unfamiliar, this is an alternative to using long-lived tokens for publishing packages, which are commonly abused by malicious actors. We’re still a longways away from this being reasonable audited/enforced for open source packages, but I look forward to getting there 🤞. <a class="link" href="https://p.datadoghq.com/sb/7dc8b3250-b3f27ea9680eb560a2a1fb8ee12ff00b?fromUser=false&refresh_mode=sliding&from_ts=1746324873556&to_ts=1748916873556&live=true&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">More than 30,000 PyPI projects</a> have voluntarily adopted Trusted Publishing to date.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://safedep.io/digging-into-dynamic-malware-analysis-signals/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>How Dynamic Analysis Revealed a Complex npm Attack Chain</b></a><br>SafeDep’s <a class="link" href="https://www.linkedin.com/in/kunalsin9h/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Kunal Singh</a> share how they used their <a class="link" href="https://safedep.io/dynamic-analysis-oss-package-at-scale/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">scalable dynamic malware analysis</a> infrastructure to reveal an npm attack chain. </p><p class="paragraph" style="text-align:left;">👋 I was mostly interested by how the malicious package worked. Instead of containing the payload or being a simplistic dropper, it used a post-install script that writes to a <code>.env</code> file to set a URL that is used in the code to fetch and trigger next steps. There are so many other malicious opportunities through abusing environment variables and similar system files 👀. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://csrc.nist.gov/pubs/cswp/41/likely-exploited-vulnerabilities-a-proposed-metric/final?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">NIST: Proposes New Metric - Likely Exploited Vulnerabilities (LEV)</a></b><br>The equation leverages historical <a class="link" href="https://www.first.org/epss/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">EPSS</a> scores to provide the probability that a vulnerability has been observed to be exploited in the wild.</p><p class="paragraph" style="text-align:left;">👋 EPSS is improving year-after-year, but I don’t know if it’s at a place where I’d be looking to build metrics based on its data. It has plenty of faults and I fear this just adds more variability. Cool research nonetheless, and likely effective at scale.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://seclists.org/fulldisclosure/2025/Jun/2?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE-2024-47081: Netrc credential leak in PSF requests library</a></b><br>A vulnerability in the popular requests library was reported back in September 2024, and has not yet been fixed, nor has it been publicly disclosed (before this week). If you maintain a <a class="link" href="https://everything.curl.dev/usingcurl/netrc.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">.netrc file</a> containing credentials, they will be leaked to the target host.</p><p class="paragraph" style="text-align:left;">👋 More discussion on <a class="link" href="https://news.ycombinator.com/item?id=44173193&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Hacker News</a>. Vulnerable code snippet <a class="link" href="https://github.com/psf/requests/blob/c65c780849563c891f35ffc98d3198b71011c012/src/requests/utils.py?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter#L240-L245" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://boostsecurity.io/blog/weaponizing-dependabot-pwn-request-at-its-finest?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Weaponizing Dependabot: Pwn Request at its finest</a></b><br>Details on how to leverage GitHub bots, such as Dependabot, for a <a class="link" href="https://en.wikipedia.org/wiki/Confused_deputy_problem?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Confused Deputy attack</a>, bypassing PR reviews to merge malicious code.</p><h2 class="heading" style="text-align:left;" id="more-links"><b>More Links</b></h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://invariantlabs.ai/blog/mcp-github-vulnerability?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>GitHub MCP Exploited: Accessing private repositories via MCP</b></a></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.legitsecurity.com/blog/remote-prompt-injection-in-gitlab-duo?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Remote Prompt Injection in GitLab Duo Leads to Source Code Theft</a></b></p><p class="paragraph" style="text-align:left;">👋 I honestly haven’t read either of these articles in-depth, but I’m not at all surprised. The world is moving too fast to be secure, and I’ve come to terms with that. What does tick me off is that many corporations, including the biggest one (the US govt) continue to cut funding on security programs. But if your business is dead, you don’t need security 🤷. Part of why I hate the instability of the tech industry — a company burning billions with a limited runway will never prioritize security. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://nixcademy.com/posts/secure-supply-chain-with-nix/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Demonstrably Secure Software Supply Chains with Nix</a></b></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@DynamoDevOps/kyverno-best-practices-policy-management-that-scales-in-kubernetes-21d4020e9ace?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Kyverno Best Practices: Policy Management That Scales in Kubernetes</b></a></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-86-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=9ed913b9-f493-4440-85e1-e0a92c31e9b1&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #85: Weekly Cybersecurity Newsletter!</title>
  <description>US Government Launches Audit of NIST’s National Vulnerability Database, CycloneDX Abandons bug bounty program funded by Sovereign Tech Fund, build &amp; deployment security</description>
  <link>https://www.cramhacks.com/p/cramhacks-85</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-85</guid>
  <pubDate>Wed, 28 May 2025 17:30:14 +0000</pubDate>
  <atom:published>2025-05-28T17:30:14Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">I’ve been having some great chats recently with founders and researchers in the software supply chain security space, and I’d love to keep that going! If you’d like to chat, send me a message on LinkedIn or reply to this email 🙂.</p><p class="paragraph" style="text-align:left;">Also, here’s a Nalu update (the real reason y’all subscribed). We took her to another dog beach this weekend where she overcame her fears of the water. She swam for the first time 😅. </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/eae52e77-638d-4fd3-8162-37b4079452c1/Screenshot_2025-05-25_at_12.12.40_PM.png?t=1748200382"/><div class="image__source"><span class="image__source_text"><p>Photo Creds: Jillian, AKA Fiancé</p></span></div></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.oss-fuzz.com/posts/oss-fuzz-integrations-via-agent-based-build-generation/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OSS-Fuzz integrations via agent-based build generation</a></b><br>The latest update on leveraging AI for OSS-Fuzz integrations. The agent-based build generator takes a single input, a project URL and outputs a set of OSS-Fuzz projects with fuzzing harnesses. Testing its effectiveness included a sample of 225 projects, resulting in 88 OSS-Fuzz valid build scripts being generated.</p><p class="paragraph" style="text-align:left;">👋 Late 2024 I spent quite a bit of time experimenting with OSS-Fuzz. Despite being a Fuzzing noob, I found that I could write basic harnesses and find meaningful crashes in test projects. That said, I experienced a lot of difficulties with onboarding projects to OSS-Fuzz. I wouldn’t have had any success if it weren’t for the <a class="link" href="https://www.youtube.com/@adalogics7389/videos?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">AdaLogic videos</a>; albeit I wish the documentation was more friendly. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://kaanyagci.hashnode.dev/why-your-docker-pipeline-isnt-secure?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">So You’re Still Just docker build && docker push? Let’s Fix That</a></b><br><a class="link" href="https://www.linkedin.com/in/kaanyagci/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Kaan Yagci</a> highlights the importance of supply chain security and offers risk mitigating suggestions (with steps) for hardening builds and deployments. This includes vulnerability scanning, SBOM generation, provenance attestations, and policy enforcement through admission controllers.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/fr0gger/nova-framework?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">NOVA: Prompt pattern hunting to detect abuse of LLM applications </a></b><br>An open source prompt pattern matching system written by <a class="link" href="https://www.linkedin.com/in/thomas-roccia/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Thomas Roccia</a> that can be used to detect types of prompt content, e.g., abusive usage.</p><p class="paragraph" style="text-align:left;">👋 H/T <a class="link" href="https://www.linkedin.com/in/zack-allen-12749a76/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Zack Allen</a> for sharing this project!</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.infosecurity-magazine.com/news/us-government-launches-audit-nist/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">US Government Launches Audit of NIST’s National Vulnerability Database</a></b><br>The <a class="link" href="https://www.oig.doc.gov/wp-content/OIGPublications/Audit-of-NISTs-Management-of-the-National-Vulnerability-Database.pdf?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">official letter</a> from the US Department of Commerce’s Office (DoC) of Inspector General states that the audit will begin immediately and that the objective is to <i>“verify the effectiveness of NIST’s sustainable processes for managing NVD submission volumes, including the long-term effectiveness of its backlog reduction strategies and measures to prevent future processing delays.”</i></p><p class="paragraph" style="text-align:left;">👋 My gut tells me NIST is going to get annihilated (morally) by this audit. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/CycloneDX/cyclonedx-rust-cargo/pull/786?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CycloneDX: Abandons bug bounty program funded by Sovereign Tech Fund</a></b><br>Maintainer <a class="link" href="https://www.linkedin.com/feed/update/urn:li:activity:7331310533255561216/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Lars Francke announced on LinkedIn</a> that the project received roughly 20 submissions, but not a single one was deemed a true positive. Per Lars, they were almost exclusively AI-generated spam reports. </p><p class="paragraph" style="text-align:left;">👋 This project received <a class="link" href="https://www.sovereign.tech/tech/rusty-sboms?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">€248,960.00 from the Sovereign Tech Fund</a> for 2023-2024. No offense to anyone involved, but wtf… As far as I can tell, the project only supports generating CycloneDX SBOMs for Cargo based Rust projects. The last release was in <a class="link" href="https://crates.io/crates/cyclonedx-bom/versions?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">November 2024</a> and if they’re following <a class="link" href="https://semver.org/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Semantic Versioning</a>, they didn’t have a single stable release. I know, I’m acting like this is millions of dollars, but when it comes to open source, I do kind of expect money to go further than usual—though I probably shouldn’t.</p><p class="paragraph" style="text-align:left;">Again, I mean no offense whatsoever. For all I know this project was a major success. And if not, I’m sure there were valuable lessons learned.</p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-85-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=32004921-bcbc-4550-baf5-3ec0af10feac&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #84: Weekly Cybersecurity Newsletter!</title>
  <description>Product Updates: Chainguard, Docker, Wiz, Aikido, &amp; Socket, GitHub Action Scanners, threat hunting with public event logs, MCP Security Checklist</description>
  <link>https://www.cramhacks.com/p/cramhacks-84</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-84</guid>
  <pubDate>Wed, 21 May 2025 18:25:28 +0000</pubDate>
  <atom:published>2025-05-21T18:25:28Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday! </p><p class="paragraph" style="text-align:left;">There’s a lot going on 😮‍💨. But I had a pretty great week nonetheless, we spent lots of time with our puppy Nalu and have been going to the beach almost every day. </p><p class="paragraph" style="text-align:left;">I’ve also been learning . . . Ruby on Rails? And . . . kind of liking it? I wasn’t expecting that given my past frustrations trying to review vulnerabilities in popular gems. </p><hr class="content_break"><div class="section" style="background-color:#C0C0C0;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.herodevs.com/support?utm_source=cramhacks&utm_medium=newsletter+&utm_campaign=CramHacks&utm_id=CramHacks" target="_blank" rel="noopener noreferrer nofollow" style="color: #ff0000">Node.js 18 REACHED EOL April 30th: Act Now to Stay Secure</a></b></p><ul><li><p class="paragraph" style="text-align:left;">Over <b>10 million monthly downloads</b> of unsupported Node.js versions put businesses at risk.</p></li><li><p class="paragraph" style="text-align:left;">Recent critical CVEs (e.g., memory leaks, DoS vulnerabilities) will go unpatched after EOL.</p></li><li><p class="paragraph" style="text-align:left;">EOL Node.js triggers security warnings and jeopardizes PCI, HIPAA, and SOC2 compliance.</p></li><li><p class="paragraph" style="text-align:left;"><b>Two-thirds</b> of users don’t upgrade promptly, increasing attack surfaces.</p></li></ul><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.herodevs.com/support?utm_source=cramhacks&utm_medium=newsletter+&utm_campaign=CramHacks&utm_id=CramHacks" target="_blank" rel="noopener noreferrer nofollow" style="color: #ff0000">Don’t risk breaches or compliance failures. Contact HeroDevs for official Node.js 18 Long-term support and stay protected</a></b></p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter">Newsletter</h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/microsoft/sbom-tool/releases/tag/v4.0.2?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Microsoft SBOM Tool: SPDX 3.0 Support</b></a><br>As of sbom-tool v4.0.2, users can now specify the <code>-mi:SPDX3.0</code> cli parameter to generate or validate SBOM’s (Software Bill of Materials) using the <a class="link" href="https://spdx.github.io/spdx-spec/v3.0.1/model/Core/Classes/SpdxDocument/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">SPDX 3.0 spec</a>. The tool will continue to use SPDX 2.2 by default.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.kammel.dev/post/github_action_scanner/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Comparison of GitHub Action Scanners</a></b><br><a class="link" href="https://www.linkedin.com/in/fabian-kammel-7781b7173/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Fabian Kammel</a> published his comparison of GitHub Action Scanners: <a class="link" href="https://github.com/zizmorcore/zizmor?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Zizmor</a>, <a class="link" href="https://github.com/boostsecurityio/poutine?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Poutine</a>, <a class="link" href="https://github.com/synacktiv/octoscan?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Octoscan</a>, and <a class="link" href="https://github.com/snyk-labs/github-actions-scanner?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Snyk’s GitHub Action Scanner</a>. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://daniel.haxx.se/blog/2025/05/16/detecting-malicious-unicode/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>curl: Detecting malicious Unicode</b></a><br><a class="link" href="https://www.linkedin.com/in/danielstenberg/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Daniel Stenberg</a> shares how curl contributor <a class="link" href="https://mastodon.social/@jimfuller?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">James Fuller</a> submitted a pull-request to the project containing a unicode character that resembled its ASCII counterpart; this was for educational purposes. No human reviewer or CI job spotted the replaced character.</p><p class="paragraph" style="text-align:left;">👋 A few weeks ago, GitHub released <a class="link" href="https://github.blog/changelog/2025-05-01-github-now-provides-a-warning-about-hidden-unicode-text/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">warnings for hidden Unicode text</a>. However, that doesn’t help here given the character wasn’t hidden. Per the blog, “GitHub has told me they have raised this as a security issue internally and they are working on a fix.”</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.youtube.com/live/J4rGZBxUzYo?t=4662s&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">boostsecurity.io: Package Threat Hunter</a></b><br>👋 <a class="link" href="https://www.linkedin.com/in/francoisp/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">François Proulx</a> gave a great talk at NorthSec 2025 discussing CI/CD pipeline vulnerabilities (e.g., GitHub workflows). But he also discusses a hack week project “Package Threat Hunter” that ingests the firehose of GitHub Public events in “real-time” and leverages these event details to catch build pipeline exploits. 👏</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://go.dev/blog/tob-crypto-audit?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Go Cryptography Security Audit</a></b><br>Google contracted <a class="link" href="https://www.trailofbits.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Trail of Bits</a> to perform this audit: the results were 1 low-severity and 5 informational findings. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://medium.com/@jonathan.leitschuh/when-open-source-isnt-how-openrewrite-lost-its-way-642053be287d?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">When Open Source Isn’t: How OpenRewrite Lost Its Way</a></b><br><a class="link" href="https://www.linkedin.com/in/jonathan-leitschuh/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jonathan Leitschuh</a> publicizes how Moderne silently changed OpenRewrite’s license from Apache 2.0 to Moderne Proprietary License (MPL) while highlighting the community (and his own) prior contributions that now fall under a proprietary license. </p><p class="paragraph" style="text-align:left;">👋 This ofc isn’t the first time something like this has happened, but I’m completely shocked that there was seemingly no communication from Moderne about this change. Not good.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/slowmist/MCP-Security-Checklist?tab=readme-ov-file&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">MCP Security Checklist: A Security Guide for the AI Tool Ecosystem</a></b><br>👋 <a class="link" href="https://x.com/slowmist_team?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">SlowMist_Team</a> released what appears (at first glance) to be a very well thought out security checklist for MCP-based tools. Per the repository, they use this checklist in their MCP security audits.</p><h2 class="heading" style="text-align:left;" id="product-news">Product News</h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.chainguard.dev/unchained/announcing-chainguard-libraries-for-python-malware-resistant-dependencies-built-securely-from-source?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Chainguard Libraries for Python</a></b><br>👋 This was mentioned in last week’s newsletter, but recent LinkedIn discussions highlight some lesser-known details worth noting. Chainguard CEO <a class="link" href="https://www.linkedin.com/in/danlorenc/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Dan Lorenc</a> shared:</p><ul><li><p class="paragraph" style="text-align:left;">PyPI support currently covers ~15K libraries, with a goal of 30K to support 99.9% of downloads from the past year. It&#39;s unclear if this is based on Chainguard customer data. 🤔</p></li><li><p class="paragraph" style="text-align:left;">Java package support is closer to 30K libraries, but the percentage for 99.9% of downloads varies by ecosystem and wasn&#39;t specified for Java.</p></li></ul><p class="paragraph" style="text-align:left;">These Chainguard packages do not necessarily protect against total compromise, such as when both the source code repository and registry maintainer tokens are breached. But, Dan did mention that they are conducting some level of static analysis; so there’s a non-zero chance they will catch it.</p><p class="paragraph" style="text-align:left;">However, many recent package compromises have stemmed from the compromise of a registry maintainer token. Chainguard packages can mitigate this risk by effectively removing the registry’s hosted package from the trust chain and rebuilding packages from source. 💡 I’m curious how they handle cases where the built package differs from what is published in the registry. What if only the source repository is compromised and a previous tag is overwritten with malware, making the published package the “safe” option? So many questions! 🤯</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.docker.com/blog/introducing-docker-hardened-images/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Docker Hardened Images: Secure, Minimal, and Ready for Production</a></b><br>“Docker Hardened Images start with a dramatically reduced attack surface, up to 95% smaller, to limit exposure from the outset. Each image is curated and maintained by Docker, kept continuously up to date to ensure near-zero known CVEs. They support widely adopted distros like Alpine and Debian, so teams can integrate them without retooling or compromising compatibility.”</p><p class="paragraph" style="text-align:left;">👋 Smart move. My initial reaction was “it’s about time.”</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/blog/introducing-wizos-hardened-near-zero-cve-base-images?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">WizOS: Securing Wiz from the ground up with hardened, near-zero-CVE images</a></b><br>👋 I think Wiz has lost its way. From the time I learned about Wiz, they did very few things but did them well with an impeccable user experience. Lately everything seems to be half-baked product launches. No one can seem to find anyone willing to acknowledge or speak about their private-preview experience with WizOS. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.linkedin.com/posts/james-berthoty_i-knew-appsec-would-move-from-reachability-activity-7330592462291308544-tbe_?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQ8nOYB-qxZUjIl66dUCIFWaQoX1cd2l6U" target="_blank" rel="noopener noreferrer nofollow">Aikido: Changelog Analysis for Dependency Upgrades</a></b><br>Aikido is now leveraging AI to analyze changelogs to identify breaking changes in dependency upgrades. Comments state that they’ll be offering auto-upgrades and introducing code diff analysis w/ reachability in June. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.linkedin.com/posts/dylanayrey_feross-aboukhadijeh-was-showing-me-something-ugcPost-7327465115505557504-R1di/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Socket: precomputed reachability</a></b><br>Quick video showcasing Socket reachability in action, from a mobile device in the backseat of a car 😆. This demo shows “precomputed” reachability: “full function-level reachability analysis but performed on the full call graph _excluding) the top-level (i.e. the application code). We assume all exported functions of the direct dependencies are used (since we&#39;re not looking at the app code)”</p><p class="paragraph" style="text-align:left;">👋 This is so simple, and I feel dumb for not thinking of it, because I think it’s a great idea. Especially given I’ve built what is essentially the same thing, but for research and not product 🤦. </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-84-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=782a98a6-bbcb-4460-aa6a-57c15b870561&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #83: Weekly Cybersecurity Newsletter!</title>
  <description>Exploring npm vulnerabilities, Kyverno introduces ImageValidatingPolicy, XBOW reaches Highest Rank on HackerOne Leaderboard, Ubuntu adopts sudo-rs, LlamaFirewall</description>
  <link>https://www.cramhacks.com/p/cramhacks-83</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-83</guid>
  <pubDate>Wed, 14 May 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-05-14T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday! </p><p class="paragraph" style="text-align:left;">I did some vibe research over the weekend because I was interested in vulnerability coverage for the most used software packages. I ended up taking the top 10,000 npm packages (by downloads) and cross-referenced with <a class="link" href="http://osv.dev?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">osv.dev</a>’s npm vulnerability data. </p><p class="paragraph" style="text-align:left;">Of the 10,000 only 421 (4.21%) have disclosed one or more vulnerabilities aggregated by Google’s osv. More than half of these have only ever had one vulnerability reported. <a class="link" href="https://github.com/jkylekelly/npm-osv-explorer?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Check out the GitHub repo for more details.</a></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f505cf48-6731-4810-9011-a9659ebb58ae/image.png?t=1747240919"/></div><p class="paragraph" style="text-align:left;">For the record, I’m not bashing the open source community here. Not long ago, this would’ve been nearly 0%. My initial motivation was to point out that folks drowning in SCA alerts are really only struggling with the tip of the iceberg. Highlighting the importance of further improving open source vulnerability disclosure data and SCA tooling. </p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter">Newsletter</h2><p class="paragraph" style="text-align:left;">👋 Side note: I know we often complain about the public sector, or at least I do 😆, but it’s pretty cool that our community has a real voice. This past week CISA announced that the KEV RSS Feed would be decommissioned. Following the community’s response, CISA issued an update:</p><p class="paragraph" style="text-align:left;">“Update May 13: In an effort to enhance user experience and highlight the most timely and actionable information for cyber defenders, CISA announced a shift in how we share cybersecurity alerts and advisories. We recognize this has caused some confusion in the cyber community. As such, we have paused immediate changes while we re-assess the best approach to sharing with our stakeholders.” <a class="link" href="https://www.cisa.gov/news-events/alerts/2025/05/12/update-how-cisa-shares-cyber-related-alerts-and-notifications?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CISA</a></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://main.kyverno.io/blog/2025/04/25/announcing-kyverno-release-1.14/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Announcing Kyverno Release 1.14: ValidatingPolicy and ImageValidatingPolicy</a></b><br>Kyverno introduces specialized policy types; <a class="link" href="https://main.kyverno.io/blog/2025/04/25/announcing-kyverno-release-1.14/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter#validatingpolicy-streamlined-validation" target="_blank" rel="noopener noreferrer nofollow">ValidatingPolicy</a> centralizes validation rules into a dedicated resource type, while <a class="link" href="https://main.kyverno.io/blog/2025/04/25/announcing-kyverno-release-1.14/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter#imagevalidatingpolicy-advanced-supply-chain-security" target="_blank" rel="noopener noreferrer nofollow">ImageValidatingPolicy</a> exclusively focuses on container image verification (including signatures, SBOMs, attestations, and other artifacts).</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://sansec.io/research/license-backdoor?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Backdoor found in popular ecommerce components</a></b><br>The Sansec Forensics Team identified 21 applications affected by an identical backdoor injected six years ago, but was only recently triggered in one of their customer’s environments. Sansec estimates 500 to 1,000 ecommerce stores are running the backdoored software owned by three vendors: Tigren, Meetanshi, and MGS.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://secustor.dev/blog/renovate_generic_version_bump/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Renovate: Could you please bump that version?</a></b><br>Renovate has introduced generic version bumping, which enables bumping semantic versions in files or version fields that Renovate does not natively support. <a class="link" href="https://www.linkedin.com/in/sebastian-poxhofer/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Sebastian Poxhofer</a> highlights this feature in his blog, showcasing it’s usefulness for managing versions in helm charts. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://hackerone.com/xbow?type=user&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">XBOW: </a></b><b><a class="link" href="https://hackerone.com/xbow?type=user&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Agentic AI reaches Highest Rank on HackerOne Leaderboard</a></b><br>For a short while, XBOW was the highest rank on HackerOne’s Vulnerability Disclosure Program (VDP) leaderboard for Apr-June 2025.</p><p class="paragraph" style="text-align:left;">👋 Fifty-five HackerOne bug submissions have been confirmed as valid. No, it’s not perfect, in fact more than that have been rejected. But still, I strongly believe that offensive security AI is going to raise the bar for security. Keep up with the <a class="link" href="https://aicyberchallenge.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">AIxCC</a> (DARPA’s AI Cyber Challenge) if you’re interested! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://discourse.ubuntu.com/t/adopting-sudo-rs-by-default-in-ubuntu-25-10/60583/1?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Adopting sudo-rs By Default in Ubuntu 25.10</a></b><br>Canonical/Ubuntu makes a major statement by introducing <a class="link" href="https://github.com/trifectatechfoundation/sudo-rs?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">sudo-rs</a> in the default Ubuntu 25.10 image. So long as testing goes well, they also plan to ship it in Ubuntu 26.04 LTS.</p><p class="paragraph" style="text-align:left;">👋 I feel like the bigger security risk with sudo are all the niche features they’ve introduced; which they don’t plan to replicate in sudo-rs, so that’s good. I personally don’t care what language these utils are written in so long as they work. Albeit I’ll be pretty annoyed if we end up having to append -rs to every command. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://meta-llama.github.io/PurpleLlama/LlamaFirewall/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">LlamaFirewall: The framework to detect and mitigate AI centric security risks</a></b><br>Meta has released an open source framework designed to secure LLM-powered applications by mitigating risks such as prompt injection, agent misalignment, and insecure code risks (via guardrails). 👋 A more in-depth paper can be found <a class="link" href="https://ai.meta.com/research/publications/llamafirewall-an-open-source-guardrail-system-for-building-secure-ai-agents/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">here</a>. </p><h2 class="heading" style="text-align:left;" id="more-links">More Links</h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.sigstore.dev/sigstore-go-1-0-now-available/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">sigstore-go 1.0 is now available</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://docs.google.com/document/d/1vFVbWEJmNsAbNPRAtHclC89YQlLUt6xYIvKmFGRkcQA?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">[Draft] Improving Risk Management Decisions with SBOM Data</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://best.openssf.org/Simplifying-Software-Component-Updates?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OpenSSF: Simplifying Software Component Updates</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/blog/introducing-wizos-hardened-near-zero-cve-base-images?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Introducing WizOS: hardened, near-zero-CVE base images</a></b></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chainguard.dev/unchained/announcing-chainguard-libraries-for-python-malware-resistant-dependencies-built-securely-from-source?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Chainguard Libraries for Python</b></a></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-83-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=5c2c15a1-9e98-4c94-829c-edb7a7fbdab5&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #82: Weekly Cybersecurity Newsletter!</title>
  <description>Disney Hackers Get Jail Time, Maintainer Month, White House Proposes $500M CISA Cut, Trusting Russian State-Owned OSS Packages</description>
  <link>https://www.cramhacks.com/p/cramhacks-82</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-82</guid>
  <pubDate>Wed, 07 May 2025 17:48:03 +0000</pubDate>
  <atom:published>2025-05-07T17:48:03Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday! There hasn’t been much excitement, at least not technology-wise, this past week. But we do have some follow up from the hackers whom targeted the Happiest Place on Earth in 2024. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.nbcnews.com/news/us-news/former-disney-worker-sentenced-3-years-hacking-park-menus-changing-all-rcna202975?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Former Disney worker sentenced to 3 years for hacking into park menus</a></b><br>In June 2024, a menu production manager was terminated from Disney. The former employee then accessed the internal menu-building system and modified food listings, manipulating allergen information in restaurant menus. The malicious changes did not reach customer hands 🙏.</p><p class="paragraph" style="text-align:left;">👋 This is wild. He purposely targeted items that could harm customers with certain allergies, and even modified the menu information for wine regions to instead reflect locations of recent mass shootings.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.justice.gov/usao-cdca/pr/santa-clarita-man-agrees-plead-guilty-hacking-disney-employees-computer-downloading?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Man Agrees to Plead Guilty to Hacking Disney Employee’s Computer</a></b><br>In early 2024, a California resident published a trojan to various platforms, including GitHub, advertising it as an AI art generation tool. A Disney employee fell victim to the trojan and the malicious actor gained accessed to their personal computer, including access to their password vault—including personal and work credentials.</p><hr class="content_break"><div class="section" style="background-color:#cccccc;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><a class="image__link" href="https://www.herodevs.com/support?utm_source=cramhacks&utm_medium=newsletter+&utm_campaign=CramHacks&utm_id=CramHacks" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f83091c1-9b7b-4b9a-a246-fbbb9c6adc99/CVE_Alert_-_2.png?t=1746409854"/></a></div><p class="paragraph" style="text-align:left;"><b>Spring Security Vulnerability Alert</b></p><p class="paragraph" style="text-align:left;">CVE-2025-22234 now threatens your authentication systems. Released April 22nd, this vulnerability breaks timing attack protection and enables username enumeration in multiple Spring versions.</p><p class="paragraph" style="text-align:left;">Don&#39;t leave your systems exposed. <a class="link" href="https://www.herodevs.com/support?utm_source=cramhacks&utm_medium=newsletter+&utm_campaign=CramHacks&utm_id=CramHacks" target="_blank" rel="noopener noreferrer nofollow">HeroDevs</a> provides immediate patches and security monitoring for all affected Spring Security versions (5.7.16-6.4.4).</p></div><hr class="content_break"><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://maintainermonth.github.com/security-challenge?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub: Secure Your Open Source Projects & Earn a Free Certification!</a></b><br>The month of May is Maintainer Month! GitHub has released three exercises for: repository management, dependency management, and secret scanning. </p><p class="paragraph" style="text-align:left;">👋 Exercises should take about ~1 hr each, and you’ll receive a free GitHub Advanced Security certification test voucher if you complete all three 👀.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.databreachtoday.com/white-house-proposes-500-million-cut-to-cisa-a-28216?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">White House Proposes $500 Million Cut to CISA</a></b><br>The administration proposes a nearly 16% budget cut for the Cybersecurity and Infrastructure Security Agency; stating that cuts would exclusively focus on divisions tied to &quot;censorship.&quot;</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://sam.gov/opp/753c9598b7904657b528e9de39efdee8/view?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Request for Information (RFI) – Software Fast Track (SWFT) Tools</a></b><br>The DoD CIO is soliciting information and ideas for expediting the Authorization to Operate (ATO) process for the DoD adoption of software. They’ve “developed a voluntary procedure in which a company can provide a 3rd party produced Software Bill of Materials (SBOM) along with an independent 3rd party assessment of their software for the Department to evaluate and adopt Software faster.”</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://huntedlabs.com/the-russian-open-source-project-that-we-cant-live-without/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The Russian Open Source Project That We Can’t Live Without</a></b><br>Hunted Labs has re-ignited a sensitive topic; are we okay with state-owned Russian entities contributing to open source projects that we depend on? In this case, it’s <a class="link" href="https://github.com/mailru/easyjson?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">easyjson</a>, a package used by projects like Kubernetes.</p><p class="paragraph" style="text-align:left;">👋 Opinions are totally my own, and I’d probably feel differently if my decision set any form of global precedent, but I personally don’t love knowing this. The <a class="link" href="https://github.com/kubernetes/kubernetes/issues/117553?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">original Kubernetes repo issue</a> alludes to them not replacing it simply because of the level of effort, which I also don’t love. If there was more effort into the analysis, I’d love to see it.</p><h2 class="heading" style="text-align:left;" id="more-links">More Links</h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.cncf.io/announcements/2025/04/23/cncf-announces-graduation-of-in-toto-security-framework-enhancing-software-supply-chain-integrity-across-industries/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CNCF Announces Graduation of in-toto Security Framework</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://arstechnica.com/security/2025/05/jury-orders-nso-to-pay-167-million-for-hacking-whatsapp-users/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jury orders NSO to pay $167 million for hacking WhatsApp users</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.theregister.com/2025/05/01/redis_returns_to_open_source/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Redis &#39;returns&#39; to open source with AGPL license</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The Signal Clone the Trump Admin Uses Was Hacked</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.zdnet.com/article/oin-marks-20-years-of-defending-linux-and-open-source-from-patent-trolls/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OIN marks 20 years of defending Linux and open source from patent trolls</a></b></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-82-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=42244f15-7ccf-4b49-8b5d-2c8b91ee17d1&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #81: Weekly Cybersecurity Newsletter!</title>
  <description>MCP Servers Leaking Secrets, Backdooring more cryptocurrencies, Kali loses access to signing key, Google&#39;s 2024 Zero-Day Exploitation Analysis</description>
  <link>https://www.cramhacks.com/p/cramhacks-81</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-81</guid>
  <pubDate>Wed, 30 Apr 2025 17:01:46 +0000</pubDate>
  <atom:published>2025-04-30T17:01:46Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday! </p><p class="paragraph" style="text-align:left;">This week I’m in NYC for a team offsite and productivity is through the roof. I freak’n love grinding in person with smart people. </p><hr class="content_break"><div class="section" style="background-color:#cccccc;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8a902dd8-746e-4fbf-be59-ca36fba2ad5a/benchmark_report_ad_for_roni.png?t=1745848912"/></div><p class="paragraph" style="text-align:left;"><b>RSAC 2025 Must-Read:</b></p><p class="paragraph" style="text-align:left;"><b>95% of AppSec Fixes Don’t Reduce Risk.</b></p><p class="paragraph" style="text-align:left;">Focus on the critical 5% that truly matter.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://hubs.li/Q03k18M80?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Read the full AppSec Benchmark Report to learn how.</a></p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="other-links"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis</a></b><br>The Google Threat Intelligence Group details findings from tracking 75 zero-day vulnerabilities exploited in the wild throughout 2024. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.kali.org/blog/new-kali-archive-signing-key/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Kali: In the coming day(s), apt update is going to fail for pretty much everyone</a></b><br>🤦 The Kali maintainers lost access to the signing key for its repository, so they’ve had to create a new one. Users will have to manually download and install the new key manually, or re-image their host with the updated Kali release.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.gitguardian.com/a-look-into-the-secrets-of-mcp/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">A Look Into the Secrets of MCP: The New Secret Leak Source</a></b><br>GitGuardian Security Researcher <a class="link" href="https://www.linkedin.com/in/gaetan-f-a40497a4/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Gaetan Ferry</a> shines light on the risks of exposed secrets for MCP entities, and identified 202 of the 3,829 (5.2%) public MCP servers tested had leaked one or more secrets.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://blog.sshh.io/p/everything-wrong-with-mcp?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Everything Wrong with MCP</a></b><br><a class="link" href="https://www.linkedin.com/in/shrivushankar/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Shrivu Shankar</a> discusses MCP protocol security, UI/UX limitations, and how MCP worsens LLM security, and LLM limitations. </p><p class="paragraph" style="text-align:left;">👋 An MCP Server is intended to, but doesn’t necessarily have to be used by an LLM. I think a lot of people don’t realize that and aren’t necessarily applying the same security controls as they would a public-facing API 🙁. <a class="link" href="https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">MCP Servers: The New Security Nightmare</a> found 43% of tested implementations contained command injection flaws.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.cncf.io/blog/2025/04/24/protecting-nats-and-the-integrity-of-open-source-cncfs-commitment-to-the-community/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CNCF: Protecting NATS and the integrity of open source</a></b><br>NATS, a cloud and edge native messaging system, has been managed by the CNCF since 2018, after being donated by Synadia — who’ve made 97% of its server contributions. Recently, the CNCF publicly disclosed that Synadia has demanded that the nats[.]io domain and the nats-io GitHub organization be transferred back to Synadia, and that they plan to relicense the NATS server under the Business Source License (BUSL).</p><p class="paragraph" style="text-align:left;">👋 There are still ongoing discussions: <a class="link" href="https://github.com/cncf/toc/issues/1632?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">discussion thread</a>, <a class="link" href="https://www.synadia.com/blog/synadia-response-to-cncf?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Synadia’s public response</a>, Synadia’s <a class="link" href="https://github.com/cncf/foundation/blob/main/documents/nats/Cease%20and%20Demand%20Letter%20from%20Synadia%20Counsel.pdf?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">letter from legal counsel</a>. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://cybersecuritynews.com/cisa-threat-hunting-staff-censys-virustotal/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CISA Warns Threat Hunting Staff to Stop Using Censys & VirusTotal</a></b><br>CISA Staff were notified to cease use of VirusTotal on April 20th, following its halted use of Censys in late March.</p><p class="paragraph" style="text-align:left;">👋 I’m not following this super closely but if anyone is doing threat intelligence and malware research, I’d expect it’d be the government. News lately seems to be suggesting that’s no longer the case. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://repos.openssf.org/package-deletion-policies?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Crafting a Package Deletion Policy</a></b><br>OpenSSF’s Securing Software Repositories Working Group has released guidance for package registries adopting or revising a package deletion policy. The guidance suggests values to consider before deleting a given package: time, downloads, dependency status, and maintainer status </p><p class="paragraph" style="text-align:left;">👋 So many edge cases 🫠. I’m glad to see this guidance, but I also just wish ecosystems could standardize. What I find most confusing is knowing which ecosystems support what.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://grafana.com/blog/2025/04/27/grafana-security-update-no-customer-impact-from-github-workflow-vulnerability/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Grafana: no customer impact from GitHub workflow vulnerability</a></b><br>On Saturday, a Grafana canary token was triggered alerting them of a potential incident. Upon investigation, they observed a malicious actor had exploited a vulnerable GitHub workflow in a public repository and exfiltrated secrets from environment variables. </p><p class="paragraph" style="text-align:left;">👋 Red/Blue Teamers and malicious actors alike are enjoying <a class="link" href="https://github.com/praetorian-inc/gato?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Gato</a>/<a class="link" href="https://github.com/AdnaneKhan/Gato-X?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GatoX</a> capabilities. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">XRP: Official NPM package infected with crypto stealing backdoor</a></b><br>The npm package <a class="link" href="https://www.npmjs.com/package/xrpl?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">xrpl.js</a> versions 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2 were compromised and found to be exfiltrating private keys to access crypto wallets.</p><p class="paragraph" style="text-align:left;">👋 This feels like it happens weekly . . . Crypto has been a game changer for malicious actors; there’s interesting research to be done on amount of funds compromised and how threat actors have evolved, perhaps in large part due to the increased opportunity.</p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-81-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=a7740365-59e0-4408-96dc-af6518e3f71e&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #80: Weekly Cybersecurity Newsletter!</title>
  <description>Supply Chain Pre-RSAC Announcements, do not run any Cargo commands on untrusted projects, scanning stale branches, and more!</description>
  <link>https://www.cramhacks.com/p/cramhacks-80</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-80</guid>
  <pubDate>Wed, 23 Apr 2025 17:39:03 +0000</pubDate>
  <atom:published>2025-04-23T17:39:03Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday! </p><p class="paragraph" style="text-align:left;">I’ve been thinking about software supply chain security doomsday scenarios. Although I still think you’re more likely to get popped by a malicious package versus a vulnerable one, <a class="link" href="https://www.cramhacks.com/p/github-security-advisory-analysis?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">our vulnerability coverage is wildly suboptimal</a>. I’ll continue to argue that no good samaritans are purposely searching for vulnerabilities in non-latest versions. And barely any are looking irregardless of versions. </p><p class="paragraph" style="text-align:left;">Something as simple as keyword searches for GitHub Issues is enough to find near endless undisclosed vulnerabilities.</p><hr class="content_break"><div class="section" style="background-color:#cccccc;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f9ef2fca-2bc3-44c7-81f8-495e0a415724/image.png?t=1745374028"/></div><p class="paragraph" style="text-align:left;">Tired of chasing compliance? Concert Compliance helps SaaS companies build powerful, audit-ready programs. SOC 2, ISO 27001, PCI DSS, HIPAA — simplified.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.concertocompliance.com/schedule?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Talk to a compliance specialist today!</a></p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="pre-rsac-announcements"><b>Pre-RSAC Announcements:</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.coana.tech/resources/article/coana-joins-socket?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Coana Joins Socket to Lead the Next Generation of AppSec</a></b><br>I was rooting for Coana to make it on their own, but I’m happy for them nonetheless. This definitely boosts Socket’s potential. Although I wonder if this means furthering their vulnerability scanning, or enhancing their malicious package detection through static analysis? Or hopefully both?</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://finance.yahoo.com/news/chainguard-reaches-3-5-billion-124757711.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Chainguard hits $3.5 billion valuation after fundraise</a></b><br>I’m a fan of Chainguard, but the valuation doesn’t make much sense to me with the current product offerings. And the recent product launches seem to have flopped, at least to the public eye, but they’re likely driven by some big contracts 🤷. I do think Chainguard is in a great position to be acquired. DataDog? </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://techcrunch.com/2025/04/23/endor-labs-which-builds-tools-to-scan-ai-generated-code-for-vulnerabilities-lands-93m/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Endor Labs Raises $93M Series B</a></b><br>The valuation is reportedly “orders of magnitude higher” than their Series A 🤷. I’m not sure if they’re pivoting, but their marketing has definitely shifted to target scanning AI-generated code, as opposed to supply chain security. This might appease hype beasts but I think it’s a bad idea.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.hopper.security/post/out-of-stealth-into-the-future-of-open-source-security?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Hopper: Out of Stealth, Into the Future of Open-Source Security</b></a><br>Hopper is offering function level reachability analysis. Honestly, I don’t think we need another company doing this - but I suppose there’s plenty of market potential remaining. 🤑 I still think someone needs to bootstrap an affected functions database and sell it to all these companies wanting reachability.</p><h2 class="heading" style="text-align:left;" id="other-links"><b>Newsletter</b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://shnatsel.medium.com/do-not-run-any-cargo-commands-on-untrusted-projects-4c31c89a78d6?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Do not run any Cargo commands on untrusted projects</a></b><br><a class="link" href="https://github.com/Shnatsel?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Sergey &quot;Shnatsel&quot; Davidoff</a> details how running Cargo commands on untrusted projects can lead to malware execution. The crux is that nearly all subcommands will trigger searching for a config.toml file which can specify an alternative (malicious) rust compiler path. </p><p class="paragraph" style="text-align:left;">👋 This includes Cargo Audit! See directly below for more details.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://shnatsel.medium.com/i-am-stepping-back-from-maintaining-cargo-audit-35bb5f832d43?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">I am stepping back from maintaining ‘cargo audit’</a></b><br>Also <a class="link" href="https://github.com/Shnatsel?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Shnatsel</a>, has announced stepping away from cargo audit and the RustSec security advisory database — essentially kickstarting their deprecation. </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Unauthenticated Remote Code Execution in Erlang/OTP SSH</a></b><br>👋 Not exactly a big internet footprint, but trivial exploit.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/boostsecurityio/poutine/releases/tag/v0.17.0?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Poutine: scan stale branches for exploitable GH workflow vulnerabilities</a></b><br>👋 This is a reminder that we’re just scratching the surface of supply chain risks. Nearly every tool simply looks at the latest version or main branch. Trust me . . . there are demons in the shadows. </p><p class="paragraph" style="text-align:left;">Case in point, <b><a class="link" href="https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">How I made $64k from deleted files — a bug bounty story</a></b> consisted of cloning repositories, restoring deleted files, finding dangling blobs and unpacking .pack files to search for exposed API keys, tokens, and credentials.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/lasso-security/mcp-gateway?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">MCP Gateway: Monitor & Manage MCP Interactions</a></b><br><a class="link" href="https://www.lasso.security/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Lasso Security</a> open sourced a plugin-based gateway for orchestrating MCP servers.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://secureannex.com/blog/searching-for-something-unknow/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">30+ hidden browser extensions put 4,000,000 users at risk of cookie theft</a></b><br><a class="link" href="https://docs.google.com/spreadsheets/d/e/2PACX-1vTQODOMXGrdzC8eryUCmWI_up6HwXATdlD945PImEpCjD3GVWrS801at-4eLPX_9cNAbFbpNvECSGW8/pubhtml?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter#" target="_blank" rel="noopener noreferrer nofollow">Updated list of IOCs</a></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-80-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=a902a718-787e-473d-abab-12b029eccaa7&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #79: Weekly Cybersecurity Newsletter!</title>
  <description>CVE Program Funding Extended, MCP Server Security, Weaponizing Code Agents, Threat Modeling GitHub, Anatomy of Malicious Open Source Packages</description>
  <link>https://www.cramhacks.com/p/cramhacks-79</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-79</guid>
  <pubDate>Wed, 16 Apr 2025 17:24:00 +0000</pubDate>
  <atom:published>2025-04-16T17:24:00Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday! </p><p class="paragraph" style="text-align:left;">I’m looking forward to speaking at <a class="link" href="https://www.meetup.com/open-web-application-security-project-san-diego-owasp-sd/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OWASP San Diego</a> tomorrow and making more people feel like we’re all doomed thanks to supply chain security 🫠. </p><p class="paragraph" style="text-align:left;">In all seriousness, someone recently pointed out to me how far the industry has come in just the last few years. They were totally right; I’m trying to be less pessimistic about the current state of things. But to be fair, the current state is still pretty freak’n terrible.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">Special thank you to <a class="link" href="https://www.ox.security/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">OX Security</a> for sponsoring this week’s newsletter! Fun fact, I own a neuroscience textbook. But I’ve read maybe 20 pages . . . one day 😀.</p><div class="section" style="background-color:#f9f9f9;border-color:#222222;border-style:solid;border-width:20px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e8f94256-30d0-4a88-9a89-0eb616a4fa2d/AD_1_WEBINAR_The_Science_Behind_Alert_Fatigue__in_Security_Teams___How_to_Beat_It__1_.png?t=1744769246"/></div><p class="paragraph" style="text-align:left;"><b>Can too many alerts harm your well-being?</b><span style="color:rgb(29, 28, 29);font-size:15px;"> </span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(29, 28, 29);font-size:15px;">Join neuroscientist </span><b>Moshe Bar</b><span style="color:rgb(29, 28, 29);font-size:15px;"> and security expert </span><b>Matt Johansen (Vulnerable U)</b><span style="color:rgb(29, 28, 29);font-size:15px;"> to uncover the science of alert fatigue—and how to beat it.</span></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.ox.security/the-science-behind-fatigue-in-security-teams-and-how-to-beat-it/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Register now!</a></b></p></div><hr class="content_break"><p class="paragraph" style="text-align:left;">Unless you live under a rock, you probably heard that MITRE was only hours away from losing funding, and no longer supporting the CVE Program. Since then, CISA has announced that funding for MITRE&#39;s contract has been extended 🎉.</p><p class="paragraph" style="text-align:left;">This was a rollercoaster. I particularly enjoyed how those who regularly bash on the CVE Program were suddenly mad that it might no longer exist. 🤔</p><p class="paragraph" style="text-align:left;">Has this stirred the pot and caused redundancy plans and/or privatized vulnerability databases to be more desirable? I guess we’ll find out! That said, the European Union Agency for Cybersecurity (ENISA) did just launch the European vulnerability database (EUVD). <a class="link" href="https://euvd.enisa.europa.eu/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Site is currently in beta</a>. </p><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter </b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://queue.acm.org/detail.cfm?id=3722542&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Fifty Years of Open Source Software Supply Chain Security</a></b><br><a class="link" href="https://www.linkedin.com/in/swtch/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Russ Cox</a>, former Tech Lead of the Go programming language team (a position he held for more than a decade 🤯) discusses the evolution of software supply chain security, and how we’ve gotten to today. Topics covered include Authenticating Software, Making Builds Reproducible, Finding and Fixing Vulnerabilities, and Funding Open Source.</p><p class="paragraph" style="text-align:left;">👋 After reading this, I came across a recording of a talk Russ gave at ACM SCORED: <a class="link" href="https://www.youtube.com/watch?v=6H-V-0oQvCA&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open Source Supply Chain Security at Google</a>, in 2023. Also a fantastic resource and would make for a great lecture (IMO). I’m looking forward to the day they begin to teach supply chain security in university.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.cyber.gov.au/resources-business-and-government/essential-cybersecurity/ism/cybersecurity-guidelines/guidelines-cryptography?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Australian Signals Directorate: Guidelines for cryptography</a></b><br><i>“Note, for interoperability and maintainability reasons, HMAC-SHA256 will not be approved beyond 2030.”</i></p><p class="paragraph" style="text-align:left;">👋<b> </b>Can we talk about how <a class="link" href="http://cyber.gov.au?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">cyber.gov.au</a> pages have a complexity score, and this is somehow ‘moderate’? What the heck would be hard? 😆</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/posts/safedep_vet-activity-7315697512957259777-XpMQ?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQ8nOYB-qxZUjIl66dUCIFWaQoX1cd2l6U" target="_blank" rel="noopener noreferrer nofollow">Anatomy of Malicious Open Source Packages</a><br><a class="link" href="https://safedep.io/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">SafeDep</a> analyzed a random sample of the <a class="link" href="https://github.com/DataDog/malicious-software-packages-dataset?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">DataDog Malicious Packages Dataset</a> using its LLM-powered static analysis engine to reveal common TTPs: 78% abused npm install hooks, 65% exfiltrated system information, and 52% used code obfuscation. More stats in the full post.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">“Rules Files Backdoor”: How Hackers Can Weaponize Code Agents</a></b><br>Pillar Security’s <a class="link" href="https://www.linkedin.com/in/zivk/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Ziv Karliner</a> highlights how <a class="link" href="https://docs.cursor.com/context/rules?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Cursor’s Rules</a> file and <a class="link" href="https://docs.github.com/en/copilot/customizing-copilot/adding-repository-custom-instructions-for-github-copilot?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Copilot’s instructions</a> file can be weaponized by injecting malicious instructions. Both file types also support hidden unicode characters, making the instructions invisible to developers. They’ve also provided a tool to <a class="link" href="https://rule-scan.pillar.security/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">scan rule files for backdoors</a>.</p><p class="paragraph" style="text-align:left;">👋 I honestly didn’t even know about these instruction files. What happens if an open source project adds one of these to their project, with malicious instructions (e.g., sends env variables to a controlled endpoint)? 🤔 </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://theses.hal.science/tel-05021371v1?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Understanding and Preventing Open-Source Software Supply Chain Attacks</a></b><br><a class="link" href="https://www.linkedin.com/in/piergiorgio-ladisa/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Piergiorgio Ladisa</a> recently shared his doctoral thesis; it focuses on solidifying the basics of malware campaigns relating to open source software packages, but the depth and historical context is incredible. </p><p class="paragraph" style="text-align:left;">👋 I’m always in awe when people can turn something fairly sophisticated and difficult to talk about, into something as simple as a tree-representation. Here’s Piergiorgio doing exactly that: <a class="link" href="https://sap.github.io/risk-explorer-for-software-supply-chains/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter#/attacktree" target="_blank" rel="noopener noreferrer nofollow">Risk Explorer for Software Supply Chains</a></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.linkedin.com/pulse/can-lessons-from-software-supply-chain-security-applied-parrella-p1ioc/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Can Lessons from Software Supply Chain Security Be Applied to MCP?</a></b><br><a class="link" href="https://www.linkedin.com/in/jose-miguel-parrella/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Jose Miguel Parrella</a> considers how supply chain technologies such as trusted publishers, provenance attestations, sandboxing, and enterprise policy hooks can be applied to MCP Servers.</p><p class="paragraph" style="text-align:left;">👋 It’s time for me to go down the AI rabbit hole. From a supply chain perspective, I’m not eager to learn more about things like model poisoning. But MCP and Google’s <a class="link" href="https://developers.googleblog.com/en/a2a-a-new-era-of-agent-interoperability/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Agent2Agent protocol</a> are very clearly supply chain risks, and therefore . . . I must learn. MCP is giving big “security vs convenience” vibes. The current security concerns are very much real, but the convenience is there, and therefore adoption 📈.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://srajangupta.substack.com/p/threat-modeling-github-how-vulnerable?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Threat Modeling GitHub - How vulnerable-by-design Github is?</a></b><br><a class="link" href="https://www.linkedin.com/in/srajan-gupta/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Srajan Gupta</a> discusses existing risks within the GitHub platform, many of which have been long-discussed, but accepted as design-tradeoffs. Topics covered include: Supply Chain Attacks, Access Control Design, GitHub Actions & CI/CD Security, Secrets Management, Repository Security Design, and SHA1 Collision attacks. </p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-79-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=5e8ba1be-5a88-4390-bd04-7210fb500444&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #78: Weekly Cybersecurity Newsletter!</title>
  <description>Q&amp;A w/ Linus Torvalds, #camelgate, OSS Project for auditing GH Actions, Google announces new experimental cybersecurity model, Verizon exposed call logs</description>
  <link>https://www.cramhacks.com/p/cramhacks-78</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-78</guid>
  <pubDate>Wed, 09 Apr 2025 16:23:57 +0000</pubDate>
  <atom:published>2025-04-09T16:23:57Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">Something to think about; is there truly a market for supply chain security? Even if so, are there other markets where supply chain security products can be better marketed?</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://stacklok.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Stacklok</a>, the creators of trusty and minder have reportedly pivoted from supply chain security to making using AI safer and more productive for developers. Arguably still supply chain security, but with a narrower focus in a booming market. </p><p class="paragraph" style="text-align:left;">Similarly, <a class="link" href="https://crashoverride.com/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CrashOverride</a> has recently rebranded, changing its focus on ingesting metadata into artifacts for supply chain security, to now building an Engineering Relations Management (ERM) solution. Connecting the dots across code, cloud, builds, deployments, and more. Which you might do by ingesting metadata into artifacts? 😅 But again, perhaps this comes with improved marketability.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://en.wikipedia.org/wiki/Npm_left-pad_incident?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">A Little piece of history: npm left-pad incident</a></b><br>Why don’t registries allow deleting packages? Well, it’s because of history! One incident occurred in 2016, where a maintainer deleted a package after a naming dispute; the package was named kik, and the company Kik Messenger didn’t like that 😅. Upon it’s removal, thousands of software projects which depended on the package were unable to be built or installed. 🎉 </p><hr class="content_break"><div class="section" style="background-color:transparent;border-color:#0CAFEF;border-radius:20px;border-style:solid;border-width:5px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Upcoming Events</h2><p class="paragraph" style="text-align:left;">How best to educate folks of software supply chain security risks? Speak the truth 🤔.</p><p class="paragraph" style="text-align:left;">It sounds simple, but the average person isn’t (usually) wondering “how might a malicious actor compromise my build environment, pipeline, or deployment. That’s what I’m here for 😈. </p><p class="paragraph" style="text-align:left;">I’m looking forward to spreading the word by discussing software package vulnerabilities, malicious packages, and software integrity 🧠. If you’ll be at either of these upcoming events, let me know!!</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.meetup.com/open-web-application-security-project-san-diego-owasp-sd/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Open Web Application Security Project San Diego (OWASP-SD)</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://planetcybersec.com/061125-conference/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Planet Cyber Sec AppSec SoCal</a></b></p></div><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter </b></h2><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.blog/open-source/git/git-turns-20-a-qa-with-linus-torvalds/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Git turns 20: A Q&A with Linus Torvalds</a></b><br>👋 The full video should be available soon (at the same link), but reading the transcript was insightful on its own. Keep in mind that I was in elementary school 20 years ago, so this is basically a history for me.</p><p class="paragraph" style="text-align:left;">The Q&A briefly touches on the design decision to use SHA-1, a common complaint that led to a rather large transition project to instead use SHA-256. “to me, SHA-1 hashes were never about the security. It was about finding corruption.”-Linus Torvalds</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://unit42.paloaltonetworks.com/github-actions-supply-chain-attack/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter#update-4-2-25" target="_blank" rel="noopener noreferrer nofollow">tj-actions/changed-files Incident: Full Events</a></b><br>👋 These events took place over four months, and there were some significant gaps in activity. This is usually good signal that the threat actor is apart of some organized group, although nothing is for certain. Given prior heists targeting crypto-platforms, this won’t be the last attempt.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ddeab786-375c-4556-a2de-e8f2ca6fa2a7/image.png?t=1744120178"/></div><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/github/audit-actions-workflow-runs?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Audit GitHub Actions used in workflow runs for an organization, Enterprise or repository</a></b><br>GitHub’s <a class="link" href="https://www.linkedin.com/in/paul-h-579a1a243/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Paul Hodgkinson</a> has open-sourced an unofficial tool for auditing workflow runs; as the title suggests 😉. The tool allows for listing workflow runs between specified dates, along with the Actions, their specific versions, and commits used.</p><p class="paragraph" style="text-align:left;">👋 There’s also a script for checking exposed secrets caused by the tj-actions/changed-files and reviewdog compromises mentioned above. I suspect this tool will come in handy.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Google announces Sec-Gemini v1, a new experimental cybersecurity model</a></b><br>The model reportedly outperforms others in cybersecurity benchmarks (<a class="link" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter#:~:text=Figure%201%3A%20Sec%2DGemini%20v1%20outperforms%20other%20models%20on%20the%20CTI%2DMCQ%20Cybersecurity%20Threat%20Intelligence%20benchmark." target="_blank" rel="noopener noreferrer nofollow">CTI-MCQ</a> & <a class="link" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter#:~:text=Figure%202%3A%20Sec,the%20CWE%20taxonomy." target="_blank" rel="noopener noreferrer nofollow">CTI-RCM</a>) thanks to integrations with Google Threat Intelligence, and OSV. </p><p class="paragraph" style="text-align:left;">👋 Currently not available to the public, but you can request early access <a class="link" href="https://docs.google.com/forms/d/1MBVz-2Zf7u8fEiZlP2_Kw_ZIlu-NQ372dkodFhqcYaQ/viewform?edit_requested=true&utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">here</a>. I think this is too early for me to get excited over, but it’s giving me something to look forward to! </p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://evanconnelly.github.io/post/hacking-call-records/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Verizon: Hacking the Call Records of Millions of Americans</a></b><br>Researcher <a class="link" href="https://www.linkedin.com/in/evan-connelly/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Evan Connelly</a> identified a public endpoint that leaked call logs when provided with a Verizon phone number. The endpoint is intended to be used by the Verizon Call Filter iOS app, but did not perform meaningful authorization checks, despite requiring a JWT.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://github.com/npm/cli/issues/8203?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">#camelgate: Can&#39;t install camelcase, decamelize and other camel packages</a></b><br>On April 1st, the ‘camel’ keyword broke the internet. <a class="link" href="https://www.cloudflarestatus.com/incidents/gshczn1wxh74?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Cloudflare deployed a change to their WAF ruleset</a> that blocked sites containing the &#39;camel’ keyword due to the Apache Camel Remote Code Execution vulnerability (<a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29891?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">CVE-2025-29891</a>).</p><p class="paragraph" style="text-align:left;">👋 I could’ve been convinced that this was an April Fools joke, but it’s not. I first heard of this because projects were failing builds due to npm registry request being blocked. But I see other platforms were affected, like Stackoverflow, where opening a question with ‘Camel’ in the name led to an error page 🤦.</p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-78-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=9d497f32-e8cc-4bfd-9ca2-44741bf2c0e1&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CramHacks Chronicles #77: Weekly Cybersecurity Newsletter!</title>
  <description>Compromised GitHub Actions, IngressNightmare, WIZ Vuln DB Fail, Chainguard VMs &amp; Libraries, $3M to find suspicious open source contributors</description>
  <link>https://www.cramhacks.com/p/cramhacks-77</link>
  <guid isPermaLink="true">https://www.cramhacks.com/p/cramhacks-77</guid>
  <pubDate>Wed, 02 Apr 2025 16:59:23 +0000</pubDate>
  <atom:published>2025-04-02T16:59:23Z</atom:published>
    <dc:creator>Kyle Kelly</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hello, and Happy Monday!</p><p class="paragraph" style="text-align:left;">Life Update: We’ve built a home gym in our garage, and I’m now jacked. It has technically only been a week, but most of you will probably never see me in real life, so who cares? </p><p class="paragraph" style="text-align:left;">We also tried to replace the sink in our bathroom. This was going great until we had a big hole in the wall and broken tiles. Computers never hurt me like home improvement projects do.</p><p class="paragraph" style="text-align:left;">💻️ I’m working on a blog about the <a class="link" href="https://proxy.golang.org/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Go Module Mirror</a>. TL;DR: I feel a need to understand its intentions better. One would assume that a command like, <code>go get github.com/org/package_name</code> would directly pull the package from GitHub, but that’s not necessarily true.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="newsletter"><b>Newsletter </b></h2><div class="section" style="background-color:transparent;border-color:#0CAFEF;border-radius:20px;border-style:solid;border-width:5px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>The Wiz Special:</b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">GitHub Action supply chain attack: reviewdog/action-setup</a></b><br><a class="link" href="https://www.linkedin.com/in/ramimac/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a> investigates the root cause and intentions of the recently compromised <a class="link" href="https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised?utm_source=www.cramhacks.com&utm_medium=referral&utm_campaign=cramhacks-chronicles-76-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">tj-actions/changed-files</a> GitHub Action. Reporting that the malicious actor was targeting Coinbase and that the tj-actions[bot] PAT token was compromised after poisoning the <a class="link" href="https://github.com/reviewdog/action-setup?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">reviewdog/action-setup</a> GitHub Action—an action used by tj-actions/eslint-changed-files and would have access to the tj-actions[bot] PAT token.</p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">IngressNightmare: Unauthenticated RCE Vulnerabilities in Ingress NGINX</a></b><br>WIZ researchers disclosed a vulnerability in the Ingress NGINX Controller that enables network users to inject an arbitrary NGINX configuration by sending a malicious ingress object to the admission controller. </p><p class="paragraph" style="text-align:left;"><i>“To be clear, gaining initial access to a cluster&#39;s pod network is not as difficult as one might think - containerization on its own is not a strong security boundary, and many applications running on K8s are susceptible to container escape” -WIZ</i></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.wiz.io/vulnerability-database?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">WIZ Vulnerability Database</a></b><br>The WIZ team has launched a vulnerability database that aggregates vulnerability data from many sources. Reports generated using AI and metadata, such as “Has Public Exploit?” seem questionable, to say the least. </p><p class="paragraph" style="text-align:left;">💩 The vulnerability database is untrustworthy, and if I had that influence, I would probably shut it down. Someone clearly doesn’t understand the EPSS model, and the technology assignments are wildly inaccurate. I haven’t even bothered to look at the more specific details.</p><p class="paragraph" style="text-align:left;">But I like the “High Profile” section—the ones I’ve read were clearly written/reviewed by a knowledgeable human. Keep that, and partner with Google’s <a class="link" href="http://osv.dev?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">osv.dev</a> for better-quality data. </p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#0CAFEF;border-radius:20px;border-style:solid;border-width:5px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Chainguard Assemble</b></p><p class="paragraph" style="text-align:left;">This looked like a great event, and they released a lot of content yesterday. But Chainguard should’ve published a “Chainguard Assemble Event Overview” highlighting the newly launched products. There is an overview page, the first Google result, but no product information. Marketing miss! </p><p class="paragraph" style="text-align:left;">📰 I have no insights on the effectiveness of either of these product launches, but the launch itself is lacking big time. IMO, Chainguard doesn’t seem to be excited about these, so why should I be? . . . However, I think Chainguard Libraries is a cool idea and should be straightforward for packages adhering to reproducibility standards. Not sure what the answer is for the vast majority that don’t.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chainguard.dev/unchained/announcing-chainguard-vms-minimal-zero-cve-container-host-images?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Chainguard VMs</a><br><i>“Host containers on optimized, minimal, zero-CVE virtual machine images rebuilt from source daily for ephemeral cloud instances.”</i></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chainguard.dev/unchained/announcing-chainguard-libraries-guarded-java-language-dependencies-built-from-source?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Chainguard Libraries</a><br><i>“Consume libraries continuously built from source in Chainguard’s SLSA Level 2 build infrastructure, eliminating supply chain attacks at build and distribution phases of the package lifecycle.”</i></p></div><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://siliconangle.com/2025/03/19/jfrogs-conan-introduces-conan-audit-strengthen-c-c-dependency-security/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">JFrog introduces Conan Audit to strengthen C/C++ dependency security</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://techcrunch.com/2025/03/19/hunted-labs-lands-3m-to-find-suspicious-open-source-contributors?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Hunted Labs lands $3M to find suspicious open source contributors</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.praetorian.com/blog/codeqleaked-public-secrets-exposure-leads-to-supply-chain-attack-on-github-codeql/?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.tenable.com/blog/imagerunner-a-privilege-escalation-vulnerability-impacting-gcp-cloud-run?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://opensource.org/blog/osi-endorses-united-nations-open-source-principles?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">The OSI endorses the United Nations Open Source Principles</a></b></p><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://vercel.com/blog/postmortem-on-next-js-middleware-bypass?utm_medium=email&_hsenc=p2ANqtz-8jL3E3Y8kHwsOMB7_T1_0IKBbaOQgOZHstu4TmrVZekPKVGW4Ug_XPvdU2qrFL1l7Kuol1PfYPH_vUJBNJUYuNXcGlag&_hsmi=354511773&utm_content=354511773&utm_source=hs_email" target="_blank" rel="noopener noreferrer nofollow">Postmortem on Next.js Middleware bypass</a></b></p><h2 class="heading" style="text-align:left;" id="until-next-time"><b>Until Next Time! </b>👋</h2><p class="paragraph" style="text-align:left;">Hey, you made it to the bottom – thanks for sticking around!</p><p class="paragraph" style="text-align:left;">Questions, ideas, or want to chat? Slide into my inbox! 💌</p><p class="paragraph" style="text-align:left;">Don’t hesitate to forward if someone could benefit from this.</p><p class="paragraph" style="text-align:left;">See you next Monday!<br>-Kyle</p><p class="paragraph" style="text-align:left;">P.S. CramHacks has a Supporter tier! You can <a class="link" href="https://www.cramhacks.com/upgrade?utm_source=www.cramhacks.com&utm_medium=newsletter&utm_campaign=cramhacks-chronicles-77-weekly-cybersecurity-newsletter" target="_blank" rel="noopener noreferrer nofollow">upgrade here</a> to support CramHacks and its free weekly content 😃.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=811a8a44-0eed-42a4-9a98-b130e76933c6&utm_medium=post_rss&utm_source=cramhacks">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
