<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>tl;dr sec</title>
    <description>The best way to keep up with cybersecurity research. Join &gt;90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.</description>
    
    <link>https://tldrsec.com/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/xgTKUmMmUm.xml" rel="self"/>
    
    <lastBuildDate>Sun, 19 Apr 2026 03:21:02 +0000</lastBuildDate>
    <pubDate>Thu, 16 Apr 2026 14:30:00 +0000</pubDate>
    <atom:published>2026-04-16T14:30:00Z</atom:published>
    <atom:updated>2026-04-19T03:21:02Z</atom:updated>
    
      <category>Software Engineering</category>
      <category>Artificial Intelligence</category>
      <category>Cybersecurity</category>
    <copyright>Copyright 2026, tl;dr sec</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/080a561f-2435-4477-a549-ab9f115e047c/tldrsec_robot_nowords.png</url>
      <title>tl;dr sec</title>
      <link>https://tldrsec.com/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>[tl;dr sec] #324 - OpenAI&#39;s GPT-5.4-Cyber, Solve by Default, GitHub Action Security</title>
  <description>OpenAI&#39;s new cyber-focused model and early access program, how to solve instead of defer tasks, securing GitHub Actions</description>
  <link>https://tldrsec.com/p/tldr-sec-324</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-324</guid>
  <pubDate>Thu, 16 Apr 2026 14:30:00 +0000</pubDate>
  <atom:published>2026-04-16T14:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🎭️ Backstage Tour</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Last weekend one of the primary San Francisco theaters (the Orpheum) had an open house where you could go on the stage, backstage, everywhere. It was awesome 😍 </p><p class="paragraph" style="text-align:left;">There was a magical moment of standing on the stage, and then seeing them raise the curtain.</p><p class="paragraph" style="text-align:left;">I went downstairs backstage and saw the electronics/lighting room, stood in the pit where the orchestra plays, saw the (surprisingly small) dressing rooms with the mirrors, and more.</p><p class="paragraph" style="text-align:left;">Some fun facts I learned:</p><ul><li><p class="paragraph" style="text-align:left;">Everything you need to put on a given musical travels with the show in shipping trucks, including all of the set pieces, costumes, props, lighting, etc.</p></li><li><p class="paragraph" style="text-align:left;">For “smaller shows” that are maybe ~7-12 trucks worth, they arrive at a new venue at say 8am, the crew rapidly sets everything up, breaks for dinner at 5pm, then <i>puts on the first show</i> at 7pm <i>that night</i> 🤯 </p></li><li><p class="paragraph" style="text-align:left;">~60-80% of the behind the scenes folks are local to that theater, and they don’t know the show at all yet opening night. So there’s a handful of folks traveling with the show who are orchestrating everything so it’s set up properly.</p></li><li><p class="paragraph" style="text-align:left;">The folks on lights have ear pieces, and while they’re learning a new show they may just get guidance from the stage manager like, “OK your next cue is you’re going to pick up stage right a man in blue clothing, 50% brightness, these light settings.” But they don’t know which character it is so they’re just kinda guessing at first.</p></li><li><p class="paragraph" style="text-align:left;">Actors often change in almost pitch darkness (except for some lighting they wear around their head) so the light doesn’t bleed on to the stage.</p></li></ul><p class="paragraph" style="text-align:left;">I also saw a “quick change” demo. Sometimes actors only have a few moments to change, so they did a demo of a &lt;1 minute wardrobe change.</p><p class="paragraph" style="text-align:left;">There’s actually a ton of prep and thoughtfulness that goes into orchestrating a quick change: how the pants or dress are “pooled” on the ground so you can just step in, how the boots are positioned so they don’t catch on the clothes, how the top layers are laid down to minimize rotation and movement when putting them on, and how there can be one (or more) wardrobe people helping the actors put everything on. Whoa.</p><p class="paragraph" style="text-align:left;">Meanwhile, I put on my own clothes like a plebe.</p><p class="paragraph" style="text-align:left;">As you might suspect, cybersecurity is just my bridge career, until I get into the stable, lucrative theater or screen industries 👨‍🎤 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Secure Coding from Design to Deployment</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Secure coding starts long before production. </p><p class="paragraph" style="text-align:left;">Modern applications move fast, which means security needs to be built in from the start, not added later. From API design to input handling and access control, early decisions have a big impact on reducing risk.</p><p class="paragraph" style="text-align:left;">The <i><b>Secure Coding Best Practices Cheat Sheet</b></i> covers key areas like secure design foundations, strong authentication and authorization, input validation, and preventing common vulnerabilities such as XSS, SQL injection, and broken access control.</p><p class="paragraph" style="text-align:left;">Reduce risk early with practical secure coding and design best practices.</p><h2 class="heading" style="text-align:center;"><span style="color:#2C81E5;">👉 </span><a class="link" href="https://www.wiz.io/lp/secure-coding-best-practices-cheat-sheet?utm_source=tldrsec&utm_medium=paid-email&utm_campaign=FY25Q4_INB_FORM_Secure-Coding-Best-Practices&sfcid=701Py00000HFVUjIAP&utm_term=FY27Q1-tldrsec-nl-april&utm_content=Secure-Coding-Best-Practices" target="_blank" rel="noopener noreferrer nofollow"><b>Get the Cheat Sheet</b></a><span style="color:#2C81E5;"><b> </b></span><span style="color:#2C81E5;">👈</span></h2></div><p class="paragraph" style="text-align:left;">I love me a good cheat sheet, and I like the focus on secure by design and the most common vulnerability classes 👌 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"></div><p class="paragraph" style="text-align:left;"><a class="link" href="https://theengineersetlist.substack.com/p/ive-completely-changed-how-i-work?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">I&#39;ve Completely Changed How I Work</a><br>Friend of the newsletter <a class="link" href="https://www.linkedin.com/in/scott-behrens-6bb8611/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Scott Behrens</a>, Principal Security Engineer at Netflix, describes how he’s adopted a &quot;solve by default&quot; mindset using AI coding agents to directly implement solutions rather than filing tickets or waiting for other teams. Scott gives an example of playing around with building a user-friendly sandbox, noticed some GoLang services he was sandboxing didn’t support proxies, so he cloned the repo, had Claude understand the codebase and conventions, built a proxy feature fix with tests and documentation, and got the PR merged in ~1 hour. This approach extends to security assessments, data analysis, and operational tasks.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;"><b>Turn meetings into tangible products</b> - Scott has an AI notetaker in meetings, which he can then use a prompt to turn that into a PRD which his agents can then start building immediately after the meeting.</p></li><li><p class="paragraph" style="text-align:left;"><b>Turn memos into implementations</b> - “When I think of defaulting to writing something down, or someone shares a strategy doc, problem statement, idea, etc., I immediately ask Claude, “Let&#39;s take the relevant part of this and turn it into an implementation.”</p></li></ul></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://theengineersetlist.substack.com/p/solve-by-default?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Solve By Default</a><br>Follow-post by <a class="link" href="https://www.linkedin.com/in/scott-behrens-6bb8611/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Scott Behrens</a> continuing his “solve by default” thread, which he defines as: “when problems emerge that you traditionally wouldn&#39;t solve (e.g., execution risks, legacy organizational red tape/paperwork, limited bandwidth), you now solve them with genAI.” Scott shares practical examples including: turning ideas from a meeting into a PRD and having the <a class="link" href="https://github.com/obra/superpowers?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Superpowers</a> brainstorming plugin help flesh it out then execute, noting and immediately fixing microcuts and nags discovered during pairing sessions, using your agent to turn Slack discussions into GitHub issues to save the ideas, and having agents optimize slow builds, painful runbooks, slow on-call processes, etc.</p><p class="paragraph" style="text-align:left;">Scott recommends seeking high-value problems by examining product briefs, incident trends, tech debt backlogs, and gaps between team charters, while avoiding low-impact work by evaluating value, scope, complexity, and leverage before committing time.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.defendersinitiative.com/p/i-watched-all-11-main-stage-keynotes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">I watched all 11 main stage keynotes</a><br><a class="link" href="https://www.linkedin.com/in/adrian-sanabria/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Adrian Sanabria</a> watched all 11 RSAC 2026 main stage keynotes (<a class="link" href="https://www.youtube.com/watch?v=Rz_lvK0hRxg&list=PLeUGLKUYzh_gVdsnw6tRhS-gbhn2BE3TU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">YouTube playlist</a>) and <span style="text-decoration:line-through;">lived to tell the tale</span> and kindly gives us an overview. People generally agreed that AI agents must be secured immediately, but no one has figured out how yet (key challenges: asset discovery, data permissions modeling, output validation, auditability of AI reasoning, compliance and the integrity problem where agents fabricate data indistinguishably from real retrieval). </p><p class="paragraph" style="text-align:left;">Speakers disagreed on fundamental architecture questions like whether agents should be ephemeral (container-like, just-in-time with minimal access) versus long-lived digital co-workers, and whether human-in-the-loop is essential or an unscalable stopgap, though most agreed detection and response must merge into a single automated step given breakout times are sometimes now measured in seconds.</p><p class="paragraph" style="text-align:left;">“If you plan on watching these keynotes, don’t base a drinking game on machine speed, agentic, real-time, or human-in-the-loop.”</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Cybercrime Just Hit Escape Velocity (Here’s the Evidence)</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Flashpoint just released its 2026 Global Threat Intelligence Report, and the data is shocking.</p><ul><li><p class="paragraph" style="text-align:left;">AI-related illicit activity surged <b>1,500%</b> in a single month</p></li><li><p class="paragraph" style="text-align:left;"><b>3.3B</b> compromised credentials are now fueling identity-based attacks</p></li><li><p class="paragraph" style="text-align:left;">Ransomware incidents increased <b>53%</b> as groups pivot toward pure-play extortion</p></li></ul><p class="paragraph" style="text-align:left;">The report also explores how threat actors are moving from generative tools to agentic AI frameworks that can automate attacks at scale.</p><h2 class="heading" style="text-align:center;"><b>👉</b><a class="link" href="https://go.flashpoint-intel.com/2026-global-threat-intelligence-report?utm_source=tldrinfosec&utm_medium=newsletter&utm_campaign=Resource_RP_GTI_2026&sfcampaign_id=701Rc00000dDaIXIA0" target="_blank" rel="noopener noreferrer nofollow"><b> View Report</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Whoa, that’s some huge growth. Also, I’m curious to learn more about how threat actors are adopting autonomous agents 😅 </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://sonraisecurity.com/blog/fighting-eventual-consistency-based-persistence-an-analysis-of-notyet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Fighting Eventual Consistency-Based Persistence - An Analysis of notyet</a><br>Sonrai Security&#39;s <a class="link" href="https://linkedin.com/in/nigel-sood?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Nigel Sood</a> describes his red-blue collaboration with OFFENSAI’s Eduard Agavriloae on <a class="link" href="https://github.com/OffensAI/notyet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">notyet</a> (referenced in last week’s issue), an open-source tool that exploits AWS IAM&#39;s eventual consistency propagation window to automatically maintain admin persistence by detecting and reversing containment actions within seconds. </p><p class="paragraph" style="text-align:left;">Nigel tested nearly a dozen IR techniques against <code>notyet</code> and found that standard AWS-recommended containment methods, including inline policy deletion/modification, managed policy attachments, permission boundaries, group membership changes, access key deactivation, role deletion, and SSM runbooks like AWSSupport-ContainIAMPrincipal, were all ineffective as <code>notyet</code> detected and reversed them within the consistency window. Only Service Control Policies (SCPs) successfully contained <code>notyet</code>, as member account identities cannot modify SCP attachments even with <code>*</code> permissions.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://thomaspreece.com/2026/03/23/part-2-aws-codebuild-escalating-privileges-via-aws-codeconnections?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Part 2: AWS CodeBuild (Escalating Privileges via AWS CodeConnections)</a><br><a class="link" href="https://www.linkedin.com/in/thomas-preece-105824335/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Thomas Preece</a> discovered that from an unprivileged AWS CodeBuild job using CodeConnections, you can call an undocumented API to retrieve raw GitHub App tokens or BitBucket JWT App tokens with the full permissions of the installed CodeConnection App. The app generally has read, write and admin permissions on all repos under your organization. See <a class="link" href="https://github.com/thomaspreece/AWS-CodeBuild-HTTP-Intercept-Image?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">AWS-CodeBuild-HTTP-Intercept-Image</a> for a container image for CodeBuild that allows you to get network monitoring in place before CodeBuild starts your build.</p><p class="paragraph" style="text-align:left;">So basically your CodeConnection setup could mean you are one breached build job away from having every repo in your organization compromised 😅 AWS are not planning to fix this issue as they say CodeBuild is a &quot;trusted environment.&quot;</p><p class="paragraph" style="text-align:left;">💡 Great detailed write-up and walk through of examining how a third party system works internally 👍️ </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/github-actions-security-threat-model-and-defenses?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Primer on GitHub Actions Security - Threat Model, Attacks and Defenses</a><br>Wiz’s <a class="link" href="https://linkedin.com/in/shay-berkovich-0a09975?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Shay Berkovich</a> describes the GitHub Actions threat model, three main risks (Pull Request pwnage, script injection, 3rd party components), and a defensive playbook. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The post discusses 8 dangerous triggers (including <code>pull_request_target</code>), how script injection occurs when untrusted inputs like branch names or issue titles are directly embedded in bash commands without environment variable binding, and how compromised third-party actions cascade through dependency chains, like when attackers sequentially compromised four Actions to reach Coinbase.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/six-accounts-one-actor-inside-the-prt-scan-supply-chain-campaign?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Six Accounts, One Actor: Inside the prt-scan Supply Chain Campaign</a><br>Wiz’s <a class="link" href="https://linkedin.com/in/ramimac?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a>, <a class="link" href="https://linkedin.com/in/hila-ramati-7003a924a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Hila Ramati</a>, <a class="link" href="https://linkedin.com/in/scott-piper-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Scott Piper</a>, and <a class="link" href="https://www.linkedin.com/in/benjamin-read-41817121/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Benjamin Read</a> uncovered six total waves of activity from the same threat actor who was compromising GitHub repos via the <code>pull_request_target</code> workflow trigger. The attacker opened over 500 malicious PRs using AI-generated, language-aware payloads (conftest.py, package.json, build.rs, Makefile injections). Across over 450 analyzed exploit attempts, they observed a &lt;10% overall success rate due to misunderstandings of GitHub&#39;s permission model.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“High-value targets including Sentry, OpenSearch, IPFS, NixOS, Jina AI, and recharts all successfully blocked the attack through a combination of first-time contributor approval gates, actor-restricted workflows, and path-based trigger conditions.”</p></div><p class="paragraph" style="text-align:left;">💡 What’s interesting to me here is: 1) the likely use of AI to deliver customized, language-aware payloads. AI is great at writing code, I imagine with the right harness and scaffolding you could create reliable, per-project payloads.</p><p class="paragraph" style="text-align:left;">2) 90% of the attacks failed due to misunderstanding GitHub’s permission model. In other words, unforced error. But the threat actors are rapidly iterating and improving, they won’t make this many mistakes in the future. I’m surprised they didn’t do more testing before attacking more broadly. Unless this is their small scale testing 😅 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chainguard.dev/assemble26-announcements?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Chainguard’s Assemble 2026</a><br>Chainguard now has: Libraries (Python, JavaScript, and Java packages built from verified source), Actions (secure-by-default CI/CD workflows), hardened Agent Skills, OS Packages (30,000+ zero-CVE packages for building secure custom images), Commercial Builds (Chainguard’s hardened version of commercial software like GitLab and Elastic).</p><p class="paragraph" style="text-align:left;">💡 It’s neat to see how Chainguard took the idea of “let’s just give you 0 CVE containers so you don’t need to worry about it,” built a complex software factory to make it happen, then are now applying that concept to other domains. The product-specific posts share some interesting details about how they do it. I’m bullish on AI-powered hardening at scale, and approaches that solve classes of risks for users. Nice work.</p><p class="paragraph" style="text-align:left;"></p><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://ctid.mitre.org/fraud?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">MITRE Fight Fraud Framework</a><br><a class="link" href="https://linkedin.com/company/mitre?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">MITRE</a> has released the Fight Fraud Framework™️ (F3), a free, open knowledge base documenting tactics and techniques used by financial fraud actors based on real-world cyber fraud incidents. The framework maps fraud-specific behaviors and references applicable MITRE ATT&CK techniques where relevant, providing a common taxonomy for describing fraud incidents.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/YARAHQ/yara-rule-skill?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">YARAHQ/yara-rule-skill</a><br>By <a class="link" href="https://linkedin.com/in/floroth?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Florian Roth</a> and <a class="link" href="https://linkedin.com/in/thomas-roccia?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Thomas Roccia</a>: An LLM Agent Skill for expert YARA rule authoring, review, and optimization. Embeds industry best practices from the creator of <a class="link" href="https://github.com/YARAHQ/yara-forge?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">YARA-Forge</a> and <a class="link" href="https://github.com/Neo23x0/yaraQA?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">yaraQA</a> into your AI assistant&#39;s context. It enables natural language rule writing, review, and optimization.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://obdev.at/products/littlesnitch-linux/index.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Little Snitch for Linux</a><br>Little Snitch for Linux (<a class="link" href="https://github.com/obdev/littlesnitch-linux?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>) uses eBPF to monitor and control outgoing network connections, providing a web UI that shows which applications are connecting to which servers, with support for custom rules and automatic blocklist updates. The tool can filter by process, port, and protocol, displays traffic history and data volumes, and accepts blocklists in formats like domain-per-line, <code>/etc/hosts</code>, and CIDR ranges.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.beyondtrust.com/blog/entry/claude-control-agentic-c2-computer-use-agent?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Building Agentic C2 with Computer Use Agents</a><br>BeyondTrust’s <a class="link" href="https://www.linkedin.com/in/ryanhausknecht/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Ryan Hausknecht</a> describes a proof-of-concept command-and-control (C2) architecture using Claude&#39;s computer use capability, where a C# implant on the target endpoint executes AI-driven actions via Windows APIs (SetCursorPos, SendInput) or pyautogui. To avoid direct connections to Anthropic&#39;s API, Ryan used Azure Storage blobs as a dead drop for command polling and Azure Function Apps as a proxy to append API keys, ensuring all traffic appears to originate from Azure. </p><p class="paragraph" style="text-align:left;">Claude takes screenshots to determine screen resolution and element positioning, then issues click and keypress commands that flow through the function app back to the implant. This architecture keeps API keys off the endpoint and makes network traffic blend in with normal Azure communications.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://specterops.io/blog/2026/04/10/janus-listen-to-your-logs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Janus: Listen to Your Logs</a><br>SpecterOps&#39;s <a class="link" href="https://www.linkedin.com/in/gavin-kramer/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Gavin Kramer</a> introduces <a class="link" href="https://github.com/SpecterOps/Janus?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Janus</a>, an open-source tool that parses C2 logs from Mythic, Cobalt Strike, and Ghostwriter to surface operational friction like failed commands, retries, and tool failures that typically get lost in deleted logs. Janus shows your team where your tooling breaks, where operators lose time, and what you could automate next.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Janus helps them understand:</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">Which tools should be updated vs. retired</p></li><li><p class="paragraph" style="text-align:left;">When and why tool failures occur</p></li><li><p class="paragraph" style="text-align:left;">Which techniques are being improvised due to missing capabilities</p></li><li><p class="paragraph" style="text-align:left;">What arguments caused a Beacon object file (BOF) to crash an agent</p></li><li><p class="paragraph" style="text-align:left;">What command ran before a callback stopped checking in</p></li><li><p class="paragraph" style="text-align:left;">What activity later correlated with detection or prevention</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“Janus gives leadership the data layer that has been missing, and it answers:”</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">How much time (and therefore cost) is lost to tool failures, retries, and operator workarounds</p></li><li><p class="paragraph" style="text-align:left;">Which parts of the engagement hold the most variability in timelines and delivery?</p></li><li><p class="paragraph" style="text-align:left;">Where are we paying an “efficiency tax” due to unreliable tooling?</p></li></ul></div><p class="paragraph" style="text-align:left;">💡 I like this meta idea a lot: collecting logs (or whatever artifact is relevant) from your and your colleagues’ work to automatically surface friction and opportunity for automation. This applies to any area of security, not just red teams. </p><p class="paragraph" style="text-align:left;">I feel like this meta idea connects to Scott’s “solve by default” posts at the top- imagine continuously gathering friction points from your security team, developers, or customers and semi-automatically and quickly resolving the paper cuts.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://openai.com/index/scaling-trusted-access-for-cyber-defense?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Trusted access for the next era of cyber defense</a><br>OpenAI is scaling their Trusted Access for Cyber (TAC) program to thousands of verified defenders and launching GPT-5.4-Cyber, a fine-tuned variant of GPT-5.4 with reduced refusals for cybersecurity tasks and new binary reverse engineering capabilities. OpenAI is using strong Know Your Customer (KYC) and identity verification to limit advanced capabilities to trusted parties, and is giving targeted <a class="link" href="https://openai.com/index/openai-cybersecurity-grant-program/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">grants⁠</a>, contributing to <span style="text-decoration:underline;"><a class="link" href="https://www.linuxfoundation.org/press/linux-foundation-announces-12.5-million-in-grant-funding-from-leading-organizations-to-advance-open-source-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">open-source security initiatives</a></span><a class="link" href="https://www.linuxfoundation.org/press/linux-foundation-announces-12.5-million-in-grant-funding-from-leading-organizations-to-advance-open-source-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">⁠</a>, and investing in <span style="text-decoration:underline;"><a class="link" href="https://openai.com/index/codex-security-now-in-research-preview/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Codex Security</a></span><a class="link" href="https://openai.com/index/codex-security-now-in-research-preview/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">⁠</a> to help defenders more rapidly find and patch vulnerabilities. </p><p class="paragraph" style="text-align:left;">💡 Perhaps GPT-5.4-<i>Cyber</i> should have been the name for their <a class="link" href="https://techcrunch.com/2025/10/14/sam-altman-says-chatgpt-will-soon-allow-erotica-for-adult-users?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">erotica chatbot</a> 🤔 Jokes aside, it’s great to see OpenAI investing in securing the software ecosystem, supporting defenders, and releasing higher capability models carefully.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://labs.cloudsecurityalliance.org/mythos-ciso/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">The “AI Vulnerability Storm”: Building a “Mythos-ready” Security Program</a><br>New ~30 page Cloud Security Alliance whitepaper from <a class="link" href="https://www.linkedin.com/in/gadievron/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Gadi Evron</a>, <a class="link" href="https://www.linkedin.com/in/richmogull/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Rich Mogull</a>, <a class="link" href="https://www.linkedin.com/in/leerob/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Robert T. Lee</a>, and a huge list of other contributors authors. A briefing for security leaders on how AI-driven vulnerability discovery is reshaping the defender timeline, the operating model of vulnerability management, and the minimum actions required now. Nice overview of recent events and important things to consider for your security program. See:</p><ul><li><p class="paragraph" style="text-align:left;">p15 - 10 Questions to Understand Your Security Program State and Influence</p></li><li><p class="paragraph" style="text-align:left;">p16 - A Mythos-ready Security Program Risk Register </p></li><li><p class="paragraph" style="text-align:left;">p19 - Priority Actions for a Mythos-ready Security Program</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://apiiro.com/blog/4x-velocity-10x-vulnerabilities-ai-coding-assistants-are-shipping-more-risks?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">4x Velocity, 10x Vulnerabilities: AI Coding Assistants Are Shipping More Risks</a><br>Apiiro’s <a class="link" href="https://www.linkedin.com/in/itay-nussbaum-400976b9/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Itay Nussbaum</a> shares results from analyzing the impact of AI coding assistants across tens of thousands of repositories in Fortune 50 orgs. They found AI-assisted developers produced 3-4x more commits, but they were packaged into fewer PRs. By June 2025, AI-generated code was introducing over 10,000 new security findings per month across the repos in their study, a 10x spike in just six months compared to December 2024. </p><p class="paragraph" style="text-align:left;">Interestingly, the types of flaws introduced by AI are different, for example, privilege escalation paths jumped 322%, and architectural design flaws spiked 153% (I’d like to know more about these are defined/measured).</p><p class="paragraph" style="text-align:left;">💡 Long term I believe coding agents + security orchestration around them will make code more, not less secure, but it’s great to see some stats and investigation on the challenges we’re facing now.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;">Mina Le - <a class="link" href="https://www.youtube.com/watch?v=p6UdIgKw4dU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">the myth of the &quot;pilates body&quot;</a> - Interesting history around the origins of pilates, barre, Jazzercise, societal expectations, and more.</p></li><li><p class="paragraph" style="text-align:left;">Game Changer - <a class="link" href="https://www.youtube.com/shorts/SGpgHlcIDlg?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Who can perform the most impressive magic trick?</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://hackread.com/fbi-recover-deleted-signal-messages-iphone-notifications?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">FBI Recovers Deleted Signal Messages Through iPhone Notifications</a> - How to protect yourself: On your iPhone, go to notification settings for Signal and set Show Previews to Never. Then open the Signal app, go to Settings &gt; Notifications &gt; Notification Content, and select No Name or Content.</p></li><li><p class="paragraph" style="text-align:left;">Dr. Mike - <a class="link" href="https://www.youtube.com/watch?v=zeA4DvEyMIk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Peptides: The Most Overhyped Trend in Fitness?</a></p></li><li><p class="paragraph" style="text-align:left;">Bryan Johnson - <a class="link" href="https://www.youtube.com/shorts/7yYcjQc4A2g?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Before you take peptides, know this</a></p></li><li><p class="paragraph" style="text-align:left;">Gabi Belle - <a class="link" href="https://www.youtube.com/watch?v=7ZWcbQys6sw&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">The Problem with Autotune on TikTok</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=gtnt84CDP-s&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Harry Potter by Balenciaga</a> - Outstanding 😂 </p></li><li><p class="paragraph" style="text-align:left;">The Primeagen - <a class="link" href="https://www.youtube.com/watch?v=alK8hgHgxd4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">I made a music video and I&#39;m not sorry</a> - “Yacht problems” 😂 </p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">The Verge - <a class="link" href="https://www.theverge.com/ai-artificial-intelligence/911118/openai-memo-cro-ai-competition-anthropic?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Read OpenAI’s latest internal memo about beating the competition — including Anthropic</a></p></li><li><p class="paragraph" style="text-align:left;">20VC with Harry Stebbings - <a class="link" href="https://www.youtube.com/watch?v=SSya123u9Yk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Demis Hassabis: Why AGI is Bigger than the Industrial Revolution & Where Are The Bottlenecks in AI</a></p></li><li><p class="paragraph" style="text-align:left;">Alex Kantrowitz - <a class="link" href="https://www.youtube.com/watch?v=J6vYvk7R190&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">OpenAI President Greg Brockman: AI Self-Improvement, The Superapp Bet, Path To AGI, Scaling Compute</a></p></li><li><p class="paragraph" style="text-align:left;">Lenny’s Podcast - <a class="link" href="https://www.youtube.com/watch?v=3UyitfSbY6c&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">How to be a CEO when AI breaks all the old playbooks | Sequoia CEO Coach Brian Halligan</a></p></li><li><p class="paragraph" style="text-align:left;">Every - <a class="link" href="https://www.youtube.com/watch?v=KRv9GpJYrUA&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">How to Build an Agent-native Product | Mike Krieger</a></p></li><li><p class="paragraph" style="text-align:left;">Anthropic - <a class="link" href="https://code.claude.com/docs/en/routines?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Automate work with routines</a> - Define routines that run on a schedule, trigger on API calls, or react to GitHub events from Anthropic-managed cloud infrastructure.</p></li><li><p class="paragraph" style="text-align:left;">Google - <a class="link" href="https://blog.google/products-and-platforms/products/chrome/skills-in-chrome/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Turn your best AI prompts into one-click tools in Chrome</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chinatalk.media/p/chinas-ai-companies-are-going-closed?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">China’s AI Companies Are Going Closed Source</a> due to funding constraints. The Chinese government continues using &quot;open source&quot; as political rhetoric in policy documents without providing the billions needed to subsidize actual open model development. The funding reality means Chinese labs can&#39;t afford to burn tens of billions on 1GW clusters like American competitors, forcing them to monetize through closed models while potentially releasing smaller open models for overseas marketing and robotics use cases.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.businesstimes.com.sg/international/global/openai-anthropic-google-unite-combat-model-copying-china?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">OpenAI, Anthropic, Google unite to combat model copying in China</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Politics</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/2k7J2dI2L_w?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Crypto currency industry </a><span style="text-decoration:line-through;"><a class="link" href="https://www.youtube.com/shorts/2k7J2dI2L_w?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">bribing</a></span><a class="link" href="https://www.youtube.com/shorts/2k7J2dI2L_w?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow"> donating to politicians</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://euromaidanpress.com/2026/04/11/ukraine-tips-drone-war-in-its-favor?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Ukraine tips drone war in its favor</a> - “Starting from December, our unmanned systems units have neutralized more enemy personnel than they recruit to their ranks.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nytimes.com/2026/04/07/us/politics/trump-iran-war.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">How Trump Took the U.S. to War With Iran</a> - Israel’s Netanyahu made the hard sell. The CIA director described the Israeli prime minister’s regime change scenarios as “farcical.” Tucker Carlson warned Trump that a war with Iran would destroy his presidency. “I know you’re worried about it, but it’s going to be OK,” the president said. Mr. Carlson asked how he knew. “Because it always is.” </p><ul><li><p class="paragraph" style="text-align:left;">“Everyone deferred to the president’s instincts. They had seen him make bold decisions, take on unfathomable risks and somehow come out on top. No one would impede him now.”</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://apropos.substack.com/p/civilization-is-a-public-good?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Civilization Is Not the Default. Violence Is.</a> - On feudalism, Pax Americana and the changing world order.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://asiatimes.com/2026/04/us-ban-on-chinese-fixed-spy-cameras-led-to-a-rising-drone-threat?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">US ban on Chinese fixed spy cameras led to a rising drone threat</a> - “The rise of drone security incidents corresponds almost exactly to the US 2019 ban on Chinese cameras at American military bases.”</p></li><li><p class="paragraph" style="text-align:left;">Steve Blank - <a class="link" href="https://steveblank.com/2026/04/09/nowhere-is-safe/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">Nowhere is Safe</a> - “The U.S. has discovered that 1) air superiority and missile defense systems designed to counter tens or hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones. And that 2) undefended high value fixed civilian infrastructure – oil tankers, data centers, desalination plants, oil refineries, energy nodes, factories, et al -are all at risk…the lessons from Iran’s attacks on infrastructure in the Gulf Cooperation Council countries is that anything on the surface is going to be a target.”</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-324-openai-s-gpt-5-4-cyber-solve-by-default-github-action-security" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=812f3eb6-5cca-4194-9cce-a1696f03fb33&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #323 - Anthropic Mythos, Security Program Politics, Vulnerability Research is Cooked</title>
  <description>New model finds thousands of 0-days and writes exploits, lessons and how to be influential from decades of being a CISO, why LLMs will democratize elite vuln hunting</description>
  <link>https://tldrsec.com/p/tldr-sec-323</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-323</guid>
  <pubDate>Thu, 09 Apr 2026 14:30:00 +0000</pubDate>
  <atom:published>2026-04-09T14:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🏫 High School Reflections</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">As you might guess from the fact that I write a cybersecurity newsletter, I was pretty cool in high school.</p><p class="paragraph" style="text-align:left;">This week I randomly came across this YouTube video <a class="link" href="https://www.youtube.com/watch?v=w_JYhUEPX54&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Learn to Solve an Integral (What Makes You Beautiful Parody)</a>, and it took me back.</p><p class="paragraph" style="text-align:left;">I remember algebra and calculus being really fun, I would have loved to make a song like this.</p><p class="paragraph" style="text-align:left;">I remember being in marching band, playing during football games. The drum line had this one riff where whenever they started playing it the band and the entire student body would start moshing. At one point they got banned from playing it because it made people too rowdy 😂 </p><p class="paragraph" style="text-align:left;">(“One time, at…”) Band camp before the school year started was a blast, we always had these epic Halo tournaments. 8 vs 8 CTF, four TVs, two in each room. Mountain Dew and smack talking galore. </p><p class="paragraph" style="text-align:left;">I took two programming classes, Visual Basic and Java, but I actually didn’t like them, and I didn’t really “get it.” It might not have helped that neither teacher really knew how to program (one was a football coach 🤷). Kind of ironic given what I do now.</p><p class="paragraph" style="text-align:left;">I wish I journaled more, it’d be fun to look back on.</p><p class="paragraph" style="text-align:left;">I wonder how your childhood and high school formed who you are today 🤔 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><b>P.S.</b> My friend and former colleague <a class="link" href="https://www.linkedin.com/in/peter-greko-850a859/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Peter Greko</a> is open to new opportunities. He worked on the AI red team at Microsoft, and most recently Block. </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;"><b> </b><b>Register for a brand new research-focused webinar series from Push Security</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Join Push Security threat researchers along with incredible guests like John Hammond, Troy Hunt, and Matt Johansen in a brand new webinar series deep-diving into the State of Browser Attacks.</p><p class="paragraph" style="text-align:left;">The browser is the place where modern breaches happen, powered by a huge amount of attacker innovation — countless ClickFix variants, new malvertised phishing campaigns intercepting users on search engines, and device code phishing attacks being powered by brand new PhaaS kits and AI tools. And we’re only in April. </p><p class="paragraph" style="text-align:left;">Get ahead of this threat evolution and register your spot now!</p><h2 class="heading" style="text-align:center;"><b>👉 </b><b><a class="link" href="https://hubs.li/Q04944Px0?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Register here</a></b><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">Push Security consistently has solid security research content, this series is going to be good. And John Hammond and Matt Johansen are both great and good friends 👍️ </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://semgrep.dev/resources/remediation-at-scale-ungated/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Remediation at Scale: What High-Performing AppSec Teams Do Differently</a><br>My colleagues at Semgrep did some interesting data crunching across 50k+ repos across 400+ organizations, analyzing stats on fix rate and mean time to remediation across SAST, SCA, and severity level, if certain vulnerability classes are harder to remediate, if catching vulnerabilities earlier improves remediation rates, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/salesforce/url-content-auditor?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">salesforce/url-content-auditor</a><br>A security auditing tool designed to detect sensitive data exposure in publicly accessible web content. It systematically scans, extracts, and audits images, PDFs, and video files using AI-powered analysis (Google Gemini API) to identify potential data leaks, compliance violations, and privacy risks.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.praetorian.com/blog/vespasian-api-endpoint-discovery-tool?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Meet Vespasian. It Sees What Static Analysis Can’t.</a><br>Praetorian&#39;s <a class="link" href="https://www.linkedin.com/in/blaynedreier/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Blayne Dreier</a>, <a class="link" href="https://www.linkedin.com/in/nathansportsman/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Nathan Sportsman</a> et al release <a class="link" href="https://github.com/praetorian-inc/vespasian?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Vespasian</a>, an open-source tool that generates API specifications (OpenAPI 3.0, GraphQL SDL, WSDL) by observing real HTTP traffic from headless browser crawls (powered by Katana) or importing existing captures from Burp Suite, HAR files, or mitmproxy. The tool uses a two-stage pipeline: first capturing traffic with full JavaScript execution to catch dynamically-constructed API calls that static analysis misses (or import traffic), then classifying requests using confidence-based heuristics, deduplicating endpoints via path normalization, and probing for metadata through OPTIONS requests, GraphQL introspection, and WSDL fetching.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.philvenables.com/post/organizational-politics-the-security-program?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Organizational Politics & The Security Program</a><br><a class="link" href="https://linkedin.com/in/philvenables?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Phil Venables</a> describes how organizational politics are a necessary skill for security leaders, arguing it&#39;s the application of influence to achieve outcomes, not something inherently negative. Phil shares lessons from decades as a CISO and Chief Risk Officer, including: decisions are pre-ordained outside formal meetings through advance consensus-building, you should embed security into existing business processes and budgets rather than creating separate initiatives, and building broad support across the organization (not just relying on your boss) is critical for program longevity. </p><p class="paragraph" style="text-align:left;">Some key tactics: leveraging the Risk = Hazard + Outrage equation to prioritize work, using Force Field Analysis to understand what&#39;s preventing change, and connecting disparate teams across the organization to build political capital beyond just security outcomes.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“<span style="color:rgb(29, 29, 31);">If you’re going into a meeting or committee and you don’t already feel confident on the outcome then you’ve missed the point and will have likely not done the work to line up support for the outcome you want. Remember, committees are the </span><span style="color:rgb(29, 29, 31);"><i>roots of power structures</i></span><span style="color:rgb(29, 29, 31);"> not the structure themselves.”</span></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><span style="color:rgb(29, 29, 31);">“Many of the security programs I’ve run also drove improvements in reliability, development agility, product features, and more. These came from observations of issues in the security processes that we could have ignored as being outside of our lane, but we decided to press and got support in doing so.”</span></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><span style="color:rgb(29, 29, 31);">“Remember, published organization charts almost never actually represent the true organization structure in terms of influence. That has to be discovered by you.”</span></p></div><p class="paragraph" style="text-align:left;">💡 So many good insights, as you’d expect from a Phil Venables post 🤯 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<span style="color:rgb(0, 1, 0);"><b> Axios. Trivy. LiteLLM. More are coming.  Root stops compromised dependencies.</b></span></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Recent software supply chain attacks just rewrote the playbook. Here&#39;s the kicker: they won&#39;t have a CVE and they won&#39;t be triggered by a scanner. These attacks exploit the one thing every pipeline trusts blindly: upstream dependencies. Compromised maintainers, hijacked registries, silent tag overwrites. By the time you notice, you&#39;ve already built and shipped it. The only fix is controlling what enters your environment. Root pins every dependency to verified, known-good versions and backports security patches without forced upgrades so you stay secure without breaking your build.</p><h2 class="heading" style="text-align:center;"><span style="color:#2C81E5;"><b>👉 </b></span><span style="color:#2C81E5;"><a class="link" href="https://www.root.io/teampcp?utm_campaign=41922123-April%202026%20-%20tldr%20sec%20newsletter%20placement%201&utm_source=tldrsec&utm_medium=newsletter" target="_blank" rel="noopener noreferrer nofollow">Fix your supply chain</a></span><span style="color:#2C81E5;"><b> 👈</b></span></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Pinning dependencies to known-good versions would prevent so many recent supply chain attacks, and I could see backported security patches saving weeks to months of dev time, depending on the company. Neat 👍️ </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/gabrielPav/aws-preflight?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">gabrielPav/aws-preflight</a><br>By <a class="link" href="https://www.linkedin.com/in/gabrielpavell/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Gabriel Pavel</a>: A security linter for AWS CLI commands that catches misconfigurations before execution, featuring 703 checks across 91 AWS services. The tool analyzes commands for issues like missing IMDSv2 enforcement, unencrypted storage, public accessibility, overly permissive IAM policies, and disabled logging.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.offensai.com/blog/notyet-aws-iam-credential-revocation-gaps?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">notyet: Open-Source Tool to Test AWS IAM Credential Revocation Gaps</a><br>OFFENSAI&#39;s <a class="link" href="https://linkedin.com/in/eduard-k-agavriloae?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Eduard Agavriloae</a> has released <a class="link" href="https://github.com/OffensAI/notyet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">notyet</a>, an open-source tool that exploits AWS IAM&#39;s eventual consistency (the ~4 second propagation window where disabled or deleted credentials remain valid) by continuously monitoring for defender actions (key deletion, policy detachment, role removal) and automatically responding with credential rotation, role assumption, policy persistence, and defensive action stripping. Notyet can help IR teams test whether their containment playbooks work against automated adversaries.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://sonraisecurity.com/enforcing-ai-governance-across-aws-orgs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Enforcing AI Governance Across AWS Organizations</a><br><a class="link" href="https://linkedin.com/company/sonrai-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Sonrai Security</a> describes how to enforce AI governance across AWS Organizations using Service Control Policies (SCPs) and Bedrock Policies to centrally manage AI service access. The post provides examples for: preventing access to the AWS control plane through AWS’s managed MCP servers, org-wide Bedrock policies for blocking prompt injection attacks, disabling specific AI services like Bedrock AgentCore, controlling model family availability, and preventing long-term Bedrock API key creation/use.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/elastic/supply-chain-monitor?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">elastic/supply-chain-monitor</a><br>By <a class="link" href="https://linkedin.com/company/elastic-co?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Elastic</a>: Automated monitoring of the top PyPI and npm packages for supply chain compromise. Polls both registries for new releases, diffs each release against its predecessor, and uses an LLM (via Cursor Agent CLI) to classify diffs as benign or malicious.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/lirantal/npm-security-best-practices?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">lirantal/npm-security-best-practices</a><br>By <a class="link" href="https://www.linkedin.com/in/talliran/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Liran Tal</a>: A curated and practical list of security best practice for using npm packages. Safe-by-default npm package manager command-line options, hardening against supply chain attacks, deterministic and secure dependency resolution, etc.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chainguard.dev/unchained/driftlessaf-introducing-chainguard-factory-2-0?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">DriftlessAF: Introducing Chainguard Factory 2.0</a><br>Chainguard’s <a class="link" href="https://twitter.com/mattomata?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Matt Moore</a>, <a class="link" href="https://www.linkedin.com/in/manfredmoser/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Manfred Moser</a>, and <a class="link" href="https://www.linkedin.com/in/mgreau/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Maxime Greau</a> announce DriftlessAF (<a class="link" href="https://github.com/driftlessaf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>), an agentic reconciliation framework that replaced their event-driven Factory 1.0 architecture. DriftlessAF uses AI-powered reconciler bots in a Kubernetes-style reconciliation loop to continuously compare desired state (zero CVEs, latest packages) against actual state across 2,000+ containers and hundreds of thousands of package versions, by reasoning about unstructured data and creating self-healing workflows that can safely discard failed work items. </p><p class="paragraph" style="text-align:left;">The framework includes Terraform modules for event-driven reconciliation infrastructure, a multi-regional work queue, and Go packages for GitHub repository, OCI container, and APK package reconciliation. Engineers now review AI-generated pull requests and package updates instead of creating them manually, while the system autonomously manages hundreds of thousands of package versions and CVE patch backports.</p><p class="paragraph" style="text-align:left;">💡 This seems like some impressive engineering, and cool that they open sourced it! I think we’ll see more of this going forward, with agents autonomously building and mending software. See OpenAI’s <a class="link" href="https://openai.com/index/harness-engineering/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Harness Engineering</a> blog or Simon Willison’s <a class="link" href="https://simonwillison.net/guides/agentic-engineering-patterns/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Agentic Engineering Patterns</a> for more.</p><p class="paragraph" style="text-align:left;"></p></div><div id="ai-security" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/step-security/dev-machine-guard?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">step-security/dev-machine-guard</a> - Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://delinea.com/resources/ai-and-identity-security-report-pdf?utm_medium=paid-newsletter&utm_source=influencer-clint-gibler&utm_campaign=br-brand-fy26-influencer-activity&utm_content=260409&utm_term=" target="_blank" rel="noopener noreferrer nofollow"><b>Is Your Identity Security Keeping Up with AI? | Delinea 2026 Report</b></a><b> </b><span style="color:#222222;">- </span><span style="color:#222222;">87% of organizations say they’re ready for AI—but nearly 50% admit they can’t fully track AI and non-human identities accessing critical systems. That gap creates unmanaged access and standing privileges. Read Delinea’s 2026 Identity Security Report to learn more.*</span></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/knostic/AgentSonar?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">knostic/AgentSonar</a> - Detect shadow AI agents by monitoring network traffic and classifying process-to-domain pairs.</p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.resilientcyber.io/p/vulnpocalypse-ai-open-source-and?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Vulnpocalypse: AI, Open Source, and the Race to Remediate</a><br>Nice post by my bud <a class="link" href="https://www.linkedin.com/in/resilientcyber/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Chris Hughes</a> synthesizing a number of stats, posts, related work, and his interviews on AI finding vulnerabilities, time to exploitation, patching challenges, etc.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://devansh.bearblog.dev/on-llms-and-vuln-research?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">On LLMs and Vulnerability Research</a><br><a class="link" href="https://www.linkedin.com/in/devansh-batham/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Devansh Batham</a> gives a number of arguments refuting that LLMs can’t understand code or find meaningful vulnerabilities, and I think makes an interesting case that LLMs + coding harnesses will likely be able to find “novel” or “creative” new vulnerability classes, as these classes are really just combinations of known primitives. </p><p class="paragraph" style="text-align:left;">For example, HTTP request smuggling is really: ambiguous protocol specification + inconsistent parsing between components + a security-critical assumption about message boundaries. And prototype pollution RCEs in JavaScript frameworks: injection + type confusion + privilege boundary crossing. This novel composition of primitives is what LLMs are increasingly good at. “Most of what we call novel vulnerability research is creative recombination within a known search space.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Vulnerability Research Is Cooked</a><br>Excellent post by <a class="link" href="https://x.com/tqbf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Thomas Ptacek</a> on the history of vulnerability research, and how LLMs are uniquely suited for finding and exploiting vulnerabilities because they already encode vast correlations across source code, understand all documented bug classes (stale pointers, type confusion, allocator grooming), and excel at the pattern-matching and constraint-solving required to chain subtle framework details into exploits.</p><p class="paragraph" style="text-align:left;">Thomas argues that this capability will democratize elite exploit development beyond high-value targets like Chrome to everything from databases to printers, overwhelming open source maintainers with verified high severity reports, making closed-source protection irrelevant (agents can reason directly from assembly), and potentially triggering bad AI security regulations that fail to recognize asymmetric costs on defenders.</p><p class="paragraph" style="text-align:left;">“We’ve been shielded from exploits not only by soundly engineered countermeasures but also by a scarcity of elite attention.”</p><p class="paragraph" style="text-align:left;">“Like many useful observations in CS, the Bitter Lesson is fractally true. It’s about to hit software security like a brick to the face.”</p><p class="paragraph" style="text-align:left;">See also their <a class="link" href="https://securitycryptographywhatever.com/2026/03/25/ai-bug-finding/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">podcast with Nicolas Carlini</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.anthropic.com/glasswing?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Project Glasswing: Securing critical software for the AI era</a><br>Anthropic announces Project Glasswing, a collaboration with AWS, Apple, Google, Microsoft, NVIDIA, and others to use Claude Mythos Preview—an unreleased frontier model that has already discovered thousands of high-severity vulnerabilities across major operating systems and web browsers—for defensive security purposes.</p><p class="paragraph" style="text-align:left;">Anthropic is providing access to 40+ organizations building critical infrastructure along with $100M in usage credits and $4M in direct donations to open-source security organizations. Launch partners include CrowdStrike, Palo Alto Networks, and Cisco. They’ve also donated $2.5M to Alpha-Omega and OpenSSF through the Linux Foundation, and $1.5M to the Apache Software Foundation.</p><p class="paragraph" style="text-align:left;">💡It’s great that Anthropic is gathering a group of partner companies to collaborate with on this, and I appreciate the sizable investment in helping secure the software ecosystem more broadly ($100M in usage credits is no joke). </p><p class="paragraph" style="text-align:left;">Prediction: models from multiple labs are going to keep getting better, and specifically better at cybersecurity, but those will mostly <i>not</i> be available except to trusted parties due to the risk of abuse. I’m glad that folks take this risk seriously.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://red.anthropic.com/2026/mythos-preview/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Assessing Claude Mythos Preview’s cybersecurity capabilities</a><br>Anthropic’s Nicholas Carlini et al discuss Mythos Preview’s capabilities in finding and exploiting zero-days in open source software, and its ability to reverse engineer exploits on closed-source software, turning N-day (known but not yet widely patched) vulnerabilities into exploits. “Over 99% of the vulnerabilities we’ve found have not yet been patched.”</p><p class="paragraph" style="text-align:left;">“In one case, Mythos Preview wrote a web browser exploit that chained together four vulnerabilities, writing a complex JIT heap spray that escaped both renderer and OS sandboxes. It autonomously obtained local privilege escalation exploits on Linux and other operating systems by exploiting subtle race conditions and KASLR-bypasses. And it autonomously wrote a remote code execution exploit on FreeBSD’s NFS server that granted full root access to unauthenticated users by splitting a 20-gadget ROP chain over multiple packets.”</p><p class="paragraph" style="text-align:left;">“We did not explicitly train Mythos Preview to have these capabilities. Rather, they emerged as a downstream consequence of general improvements in code, reasoning, and autonomy.”&quot;</p><p class="paragraph" style="text-align:left;"><b>Methodology</b>:</p><ol start="1"><li><p class="paragraph" style="text-align:left;">They launched a container (isolated from the Internet and other systems) that runs the project-under-test and its source code.</p></li><li><p class="paragraph" style="text-align:left;">They invoke Claude Code with Mythos Preview and prompt it to find bugs, and produce a proof-of-concept exploit and reproduction steps if found. </p></li><li><p class="paragraph" style="text-align:left;">To encourage Claude to focus on different parts of the code base, they first have Claude rank each file in the project from 1-5 on how likely it is to have bugs.</p></li><li><p class="paragraph" style="text-align:left;">They then invoke many copies of Claude in parallel, tasking each run focus on one of the most interesting files.</p></li><li><p class="paragraph" style="text-align:left;">Finally they ask Mythos to triage findings from prior steps.</p></li></ol></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The most critical bug they found in OpenBSD, after a thousand runs of their scaffold, cost ~$20,000 total, and found several dozen more findings.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“In 89% of the 198 manually reviewed vulnerability reports, our expert contractors agreed with Claude’s severity assessment exactly, and 98% of the assessments were within one severity level. If these results hold consistently for our remaining findings, we would have over a thousand more critical severity vulnerabilities and thousands more high severity vulnerabilities.”</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“For multiple different web browsers, Mythos Preview fully autonomously discovered the necessary read and write primitives, and then chained them together to form a JIT heap spray.”</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“We’ve used these capabilities to find vulnerabilities and exploits in closed-source browsers and operating systems. We have been able to use it to find, for example, remote DoS attacks that could remotely take down servers, firmware vulnerabilities that let us root smartphones, and local privilege escalation exploit chains on desktop operating systems.”</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Regarding <b>N-days</b>: “We began by providing Mythos Preview a list of 100 CVEs and known memory corruption vulnerabilities that were filed in 2024 and 2025 against the Linux kernel. We asked the model to filter these down to a list of potentially exploitable vulnerabilities, of which it selected 40. Then, for each of these, we asked Mythos Preview to write a privilege escalation exploit that made use of the vulnerability (along with others if chaining vulnerabilities would be necessary). More than half of these attempts succeeded.”</p></div><p class="paragraph" style="text-align:left;">See also:</p><ul><li><p class="paragraph" style="text-align:left;">AI Explained’s video: <a class="link" href="https://www.youtube.com/watch?v=txx6ec6MLNY&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Claude Mythos: Highlights from 244-page Release</a>. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/heidy-khlaaf/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Heidy Khlaaf</a> also <a class="link" href="https://www.linkedin.com/posts/heidy-khlaaf_as-someone-who-has-audited-dozens-of-safety-critical-activity-7447720977549037568-jilU/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">weighs in</a>, specifically around how Project Glasswing and Mythos are not compared against existing tools, do not discuss false positive rates, and the amount of human evaluation (e.g. in triage) is not detailed.</p></li><li><p class="paragraph" style="text-align:left;">Sean Heelan takes <a class="link" href="https://x.com/seanhn/status/2041950179817841009?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">here</a> and <a class="link" href="https://x.com/seanhn/status/2041882705017598401?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">here</a>, Tavis Ormandy <a class="link" href="https://x.com/taviso/status/2039118897891410017?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">here</a>, and Alex Matrosov on the market <a class="link" href="https://x.com/matrosov/status/2041971401050272177?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">underrating the gap</a> between finding bugs and actually proving exploitability.</p></li></ul><p class="paragraph" style="text-align:left;">💡 This was a great, detailed write-up. The hashes as proof of unfixed vulnerabilities and exploits makes sense, I like it. It’d be nice to know a bit more about model costs, false positive rates, and the level (and cost) of human involvement, but overall a pretty good amount of detail.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</a> - A researcher released the PoC for an unpatched Windows privilege escalation bug because they were unhappy with MSRC’s disclosure process.</p></li><li><p class="paragraph" style="text-align:left;">Nick Collins - <a class="link" href="https://composerprogrammer.com/introductiontocomputermusic.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Introduction to Computer Music</a> - Free ~350 page book.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/opp97ZTdm_M?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Why Charlie Puth hears music differently</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://contrapunk.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Contrapunk</a> - Real-time MIDI harmony generator and guitar-to-MIDI converter.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://middle-earth-interactive-map.web.app/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">An interactive map of Tolkien’s Middle Earth</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://playlists.at/youtube/search/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Advanced Search for YouTube</a> - Filters like exact terms, exclude terms, title includes, video length, date before/after.</p></li><li><p class="paragraph" style="text-align:left;">Alex Hormozi - <a class="link" href="https://www.youtube.com/watch?v=yb2cLMMuMdQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">How to make progress faster than everyone</a> - On being cringe, trying hard, and not comparing your first chapter to someone’s 20th.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/voldemortensen/snark-driven-development?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">voldemortensen/snark-driven-development</a> - A Claude Code skill that wraps development workflows with sharp, substance-backed snarky commentary</p></li><li><p class="paragraph" style="text-align:left;">GitHub issue: <a class="link" href="https://github.com/anthropics/claude-code/issues/42796?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Claude Code is unusable for complex engineering tasks with the Feb updates</a></p></li><li><p class="paragraph" style="text-align:left;">Lenny’s Podcast - <a class="link" href="https://www.youtube.com/watch?v=k-H4nsOTuxU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">How Anthropic added $11B in ARR in one month | Amol Avasare (Head of Growth, Anthropic)</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.complex.com/pop-culture/a/samantha-giambra-plaisance/robot-slaps-boy-china?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">Humanoid Robot Accidentally Slaps Boy During Public Demo in China</a> - After reportedly saying, “You best watch yo’ mouth son!”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.complex.com/pop-culture/a/layla-ahmad/what-is-rizzbot-meet-the-viral-disrespectful-robot-rizzing?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">What is Rizzbot? Meet the AI Robot Rizzing Up Your Girl</a> - Not gonna life, some of these <a class="link" href="https://www.tiktok.com/@rizzbot_official/video/7608271048538098974?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">videos</a> are pretty hilarious</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-323-anthropic-mythos-security-program-politics-vulnerability-research-is-cooked" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=e3eac2ab-445a-4010-af0b-49abb429705c&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #322 - GitHub&#39;s Supply Chain Roadmap, Scaling Vulnerability Management with AI, Finding Vulnerabilities Across Repos</title>
  <description>GitHub&#39;s plan to harden GitHub Actions and supply chain security, automating and scaling SAST and SCA vuln management, OSS tool that uses AI agents to reason about vulns across repos</description>
  <link>https://tldrsec.com/p/tldr-sec-322</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-322</guid>
  <pubDate>Thu, 02 Apr 2026 14:30:00 +0000</pubDate>
  <atom:published>2026-04-02T14:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🫶 Long Career, Long Friendships</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">This week I was reflecting a bit after BSidesSF and RSAC about how careers are long.</p><p class="paragraph" style="text-align:left;">I remember attending conferences when I first started in security and being intimidated by how it was crowded and full of strangers.</p><p class="paragraph" style="text-align:left;">This year, there were still many <span style="text-decoration:line-through;">strangers</span> not yet friends, but now I got to catch up with many former colleagues and friends I’ve known for years. Some for a decade 👴 </p><p class="paragraph" style="text-align:left;">It feels nice knowing we’re all working together in our own ways, at different companies, to make the world a little bit safer.</p><p class="paragraph" style="text-align:left;">Also, just wanted to share a few thoughts:</p><ul><li><p class="paragraph" style="text-align:left;">It’s OK if you don’t know people at an event or conference. 98% of the time if you go up and chat with a stranger it goes great, or at least fine. </p><ul><li><p class="paragraph" style="text-align:left;">When I’m nervous at events, I like to think about how, just by both of us being at a security event, I have a <i>vast</i> amount of shared experience and context with anyone there.</p></li></ul></li><li><p class="paragraph" style="text-align:left;">If every event you just meet a handful of people, that’s going to compound event on event, year on year. Soon you’ll likely know at least a few people at most events.</p></li></ul><p class="paragraph" style="text-align:left;">Anywho, if you attended, I hope you had a great time and made some friends, and didn’t just repeat “AI” until a VC materialized and dumped money on you.</p><p class="paragraph" style="text-align:left;"><b>P.S.</b> Dan Guido kindly turned his [un]prompted talk into a <i>tl;dr sec</i> guest post. It’s excellent, highly recommend.<br>👉️ <a class="link" href="https://tldrsec.com/p/how-we-made-trail-of-bits-ai-native-so-far?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">How we made Trail of Bits AI-native (so far)</a> 👈️ </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> Free tool: instant visibility into your Claude Desktop deployment</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Employees aren&#39;t waiting for approval. Claude Desktop is getting deployed with MCP servers, OAuth connectors, CoWork scheduled tasks, and browser-control extensions your security team never reviewed.</p><p class="paragraph" style="text-align:left;">Our Head of Security, Ed Merrett, built a lightweight, read-only audit tool to give you instant visibility. One command surfaces everything: installed extensions and whether they&#39;re signed, MCP server configs, dangling env variables, OAuth tokens, scheduled tasks, org-deployed plugins, and runtime state.</p><p class="paragraph" style="text-align:left;">p.s. If you’re looking for more help with securing the Claude ecosystem, visit <a class="link" href="https://harmonic.security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">harmonic.security</a> to check out our other free resources!</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://github.com/HarmonicSecurity/claudit-sec?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Audit your Claude setup</a> <b>👈</b></h2></div><p class="paragraph" style="text-align:left;">This is great! A free GitHub repo tool that gives you visibility into MCP servers, extensions, plugins, connectors, scheduled tasks, and permissions. Love it 👌 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/portswigger/ip-rotate?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">portswigger/ip-rotate</a><br>By <a class="link" href="https://linkedin.com/company/portswigger?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Portswigger</a>: An extension for Burp Suite that uses AWS API Gateway to rotate your IP on every request, helping bypass IP-based rate limiting, bruteforce protections, and WAF blocks.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://bughunters.google.com/blog/passkeys-are-your-new-best-friend?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Passkeys are Your New Best Friend</a><br>Google&#39;s <a class="link" href="https://linkedin.com/in/harshlal028?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Harsh Lal</a> explains how passkeys use asymmetric cryptography to replace passwords, where a private key stored on your device signs authentication challenges while the public key on the server verifies them, making them phishing-resistant through domain binding and useless if servers are breached. Nice brief overview of why passkeys are safer than passwords, signing in across devices, FAQ of security concerns, and risks: sync account hijacking (mitigated by requiring the old device&#39;s screen lock) and social engineering attacks requiring physical proximity</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.blog/security/supply-chain-security/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">A year of open source vulnerability trends: CVEs, advisories, and malware</a><br>GitHub&#39;s <a class="link" href="https://www.linkedin.com/in/jonathan-evans-240b9321/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Jonathan Evans</a> analyzes the 4,101 reviewed advisories GitHub published in 2025, the fewest since 2021, but this reflects a reduction in backfilling older vulnerabilities rather than fewer new discoveries- newly reported vulnerabilities actually increased 19% year-over-year. The data shows cross-site scripting remains the top vulnerability type; resource exhaustion, unsafe deserialization, and SSRF saw significant increases. Advisories without any CWE dropped 85% due to improved tagging. GitHub&#39;s malware advisory publications surged 69% to 7,197 (driven by campaigns like SHA1-Hulud). The GitHub CNA published 35% more CVE records (2,903 total) with 679 new organizations requesting CVE IDs. “We saw 10 to 16% growth every quarter. If this trend continues, GitHub will publish over 50% more CVEs in 2026.”</p><p class="paragraph" style="text-align:left;">💡 Frontier models are getting so much better at finding vulnerabilities + much more code is being written → 2026 is for sure going to be a record breaking year for CVEs, the only question is by how much. People are (in my opinion, correctly) talking about an upcoming “vulnpocalypse.&quot; 😅 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Webinar: Executive Impersonation and Modern Phishing Tactics</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Executive impersonation attacks pressure employees with urgency, authority, and high-stakes requests. Because they rely on social engineering instead of obvious malware, they often slip past traditional email defenses. Join Sublime Security for a live webinar on April 8 to break down how these attacks work, review real-world patterns, and learn practical ways security teams can detect and stop impersonation attempts earlier.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://sublime.security/events/executive-impersonation-in-finance/?utm_source=tldrsec&utm_medium=third-party" target="_blank" rel="noopener noreferrer nofollow"><b>Register</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/andrewbecherer/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Andrew Becherer</a> is a sharp dude, and gave an <i>excellent</i> talk at the Decibel event Daniel Miessler and I co-hosted during RSA. He definitely has perspective worth listening to.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.praetorian.com/blog/aurelian-cloud-security-tool?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Reunifying the Cloud: Introducing Aurelian for Multi-Cloud Security Testing</a><br>Praetorian&#39;s <a class="link" href="https://www.linkedin.com/in/aarushi-dwivedi/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Aarushi Dwivedi</a> et al have released <a class="link" href="https://github.com/praetorian-inc/aurelian?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Aurelian</a>, an open-source Go-based multi-cloud security framework that unifies reconnaissance, secrets discovery, and IAM analysis across AWS, Azure, and GCP. Aurelian evaluates resource policies using real IAM policy evaluation logic (not just flag checks), integrates with Titus for secrets scanning with live credential validation via API calls, and maps privilege escalation paths to Neo4j for Cypher-based querying of multi-hop attack chains.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.plerion.com/blog/dont-expose-yourself-in-public-let-aws-error-messages-do-it?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Don’t expose yourself in public - let AWS error messages do it for you</a><br>Plerion’s <a class="link" href="https://linkedin.com/in/danielgrzelak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Daniel Grzelak</a> describes how AWS recently rolled out friendly IAM error messages that inadvertently created a simple oracle for detecting publicly exposed resources: assume a role with a deny-all session policy, make a request, and if the error says &quot;explicit deny in a session policy,&quot; the resource policy would have allowed it, confirming public exposure.</p><p class="paragraph" style="text-align:left;">💡 The contents of my friend Daniel&#39;s posts have great security advice, and the titles have good life advice.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://ramimac.me/teampcp/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">TeamPCP Supply Chain Campaign</a><br>Nice round-up landing page by <a class="link" href="https://linkedin.com/in/ramimac?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://opensourcemalware.com/blog/teampcp-supply-chain-campaign?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">TeamPCP Supply Chain Campaign: A March 2026 Retrospective</a><br>Great overview by OpenSourceMalware’s <a class="link" href="http://www.linkedin.com/in/jenngile/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Jenn Gile</a> on how TeamPCP executed a cascading multi-phase supply chain attack in March 2026, leveraging a single unrevoked credential stolen from Trivy&#39;s CI pipeline to compromise several ecosystems (Aqua Security, npm, LiteLLM/PyPI, Checkmarx, and Telnyx), harvesting CI/CD secrets at each stage to fund the next, while also deploying a geotargeted filesystem wiper against Iranian infrastructure.</p><p class="paragraph" style="text-align:left;">💡 I met Jenn at the tl;dr sec community event before BSidesSF, she seems super sharp and nice 🙂 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://socket.dev/blog/axios-npm-package-compromised?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Supply Chain Attack on Axios Pulls Malicious Dependency from npm</a><br>Socket describes a supply chain attack that compromised Axios, one of the most widely used HTTP clients in the JavaScript ecosystem (~100M weekly downloads), by injecting the malicious dependency plain-crypto-js@4.2.1, which was published minutes before the poisoned Axios releases. The release appeared outside the normal Axios workflow, only two malicious versions were published, and only one line was added to package.json (the malicious dependency)- small, targeted changes being less likely to raise suspicion.</p><p class="paragraph" style="text-align:left;">💡 *Takes a long drag from my cigarette* Another day, another NPM compromise.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.vaines.org/posts/2026-03-24-the-comforting-lie-of-sha-pinning?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">The Comforting Lie Of SHA Pinning</a><br><a class="link" href="https://www.linkedin.com/in/aidenvaines/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Aiden Vaines</a> describes a subtlety of how GitHub scopes SHA hash references when you’re trying to pin a GitHub Action to a commit SHA. Basically, if you have a repo using the GitHub Action <code>avaines/gh_action@&lt;SHA&gt;</code> , and an attacker forks that action, adds malicious code, and submits a PR to the target repo that only changes the Action’s SHA reference, it will look like <code>avaines/gh_action@&lt;BAD_SHA&gt;</code> (same owner/repo name, only the SHA has changed, despite this version coming from a different GitHub user). “The result is that a pull request can replace a pinned, trusted action with attacker-controlled code without changing the apparent repository reference.”</p><p class="paragraph" style="text-align:left;">Chainguard’s <a class="link" href="https://www.linkedin.com/in/wflynch/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Billy Lynch</a> wrote about this in 2023: <a class="link" href="https://www.chainguard.dev/unchained/what-the-fork-imposter-commits-in-github-actions-and-ci-cd?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">What the fork? Imposter commits in GitHub Actions and CI/CD</a>. Great write-up.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.blog/security/supply-chain-security/securing-the-open-source-supply-chain-across-github?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Securing the open source supply chain across GitHub</a><br>GitHub&#39;s <a class="link" href="https://linkedin.com/in/steiza?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Zachary Steindler</a> discusses prevention steps you can take today, plus a look at the security capabilities GitHub is working on. He recommends enabling CodeQL to scan Actions workflows for security issues, avoiding <code>pull_request_target</code> triggers, pinning third-party Actions to full commit SHAs, and using OpenID Connect tokens with trusted publishing instead of secrets. GitHub scans all 30,000+ daily npm package publishes for malware and is accelerating their Actions security roadmap in response to attacks like Shai-Hulud, while working with OpenSSF to expand trusted publishing support across npm, PyPI, NuGet, RubyGems, and Crates.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.blog/news-insights/product-news/whats-coming-to-our-github-actions-2026-security-roadmap?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">What&#39;s coming to our GitHub Actions 2026 security roadmap</a><br>GitHub&#39;s <a class="link" href="https://www.linkedin.com/in/gregose/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Greg Ose</a> describes their 2026 roadmap to secure GitHub Actions against supply chain attacks through: introducing workflow-level dependency locking (similar to Go&#39;s go.mod/go.sum) that pins all direct and transitive dependencies with commit SHAs (future: immutable releases), implementing policy-driven execution protections via rulesets that control who can trigger workflows and which events are allowed (with evaluate mode for safe rollout), and adding scoped secrets that bind credentials to specific repositories, branches, environments, or trusted reusable workflows. </p><p class="paragraph" style="text-align:left;">GitHub is also building the Actions Data Stream for near real-time execution telemetry to S3/Azure Event Hub and a native Layer 7 egress firewall for GitHub-hosted runners that operates outside the runner VM with monitor and enforce modes, treating CI/CD infrastructure as critical infrastructure with enforceable network boundaries.</p><p class="paragraph" style="text-align:left;">💡 These seem like excellent, thoughtful improvements. Love the push towards better visibility, security controls, and secure by default. Hats off to the GitHub team for these initiatives. Unfortunately the timeline is 3-6 months, though I’d rather them build it right than poorly.</p><p class="paragraph" style="text-align:left;"></p></div><div id="red-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/googleprojectzero/Jackalope?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">googleprojectzero/Jackalope</a><br>Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android. Built on TinyInst for binary instrumentation, supports both file and shared memory sample delivery.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://projectzero.google/2026/03/mutational-grammar-fuzzing.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">On the Effectiveness of Mutational Grammar Fuzzing</a><br>Mutational grammar fuzzing is a type of fuzzing that uses a predefined grammar to describe the structure of the samples (e.g. input string or file) so that when a sample gets mutated, the resulting samples still adhere to the grammar rules. Google Project Zero’s <a class="link" href="https://x.com/ifsecure?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Ivan Fratric</a> describes two key flaws in mutational coverage-guided grammar fuzzing: 1) more coverage doesn’t mean more bugs, you need to test the right code patterns (e.g. functions need to be called in a certain order, or the result from one function is used as in input to another function), and 2) mutational fuzzing produces highly similar samples due to its greedy nature of saving slightly-modified samples that trigger new coverage. </p><p class="paragraph" style="text-align:left;">To address these issues, Ivan proposes a technique in <a class="link" href="https://github.com/googleprojectzero/Jackalope?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Jackalope</a> where the fuzzing worker spends half of the time creating a fully independent corpus generated from scratch and half of the time working on a larger corpus that also incorporates interesting samples (as measured by the coverage) from previous workers.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://andywgrant.substack.com/p/its-more-than-saying-no?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">It&#39;s More Than Saying No</a><br>Zoom’s Head of Assurance <a class="link" href="https://linkedin.com/in/andywgrant?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Andy Grant</a> describes what to do when leadership asks your offensive security team to do work it was never designed for. Andy argues that offensive security teams lose effectiveness when they accept misaligned work like QA support, rushed pentests, or control validation, which disrupts the long exploration periods needed for discovering unknown unknowns through intuition-driven research. </p><p class="paragraph" style="text-align:left;">Rather than saying no to requests, proactively engage with leadership to anticipate concerns, start investigating before formal requests arrive, and reframe incoming work to align with the team&#39;s adversarial research model, for example, reframing &quot;can you test X before release?&quot; into deeper investigations of trust boundaries and systemic risk.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/playlist?list=PLjmt1tu85IhAiVPugOjP-7Cy0Oemi3m7z&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">[un]prompted 2026 YouTube Playlist</a><br>The talk recordings have (mostly) been published. 65 talks at the forefront of AI + security. The final 9 will be uploaded soon.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://jakee.vc/rsa-2026-landscape.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">RSA 2026 Startup Landscape</a><br><a class="link" href="https://www.linkedin.com/in/jake-epstein-12915b11a/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Jake Epstein</a> mapped every cybersecurity startup at RSAC 2026 (322 companies) into 18 categories, including Agent Security / Non Human Identity, developer security, AI SOC, AI pen testing, data pipelines, human risk, and more. Neat visualization.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.anshuman.ai/posts/vulnvibes-intro?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">VulnVibes: Building an AI Agent That Reasons Across Microservices to Find Real Vulnerabilities</a><br><a class="link" href="https://linkedin.com/in/anshumanbhartiya?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Anshuman Bhartiya</a> announces <a class="link" href="https://github.com/anshumanbh/vulnvibes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">VulnVibes</a>, an AI-powered agent that analyzes Pull Requests for vulnerabilities by reasoning across multiple repositories in an organization, which is useful in microservice architectures. It searches across your entire GitHub organization to understand your architecture, verify what security controls actually exist, and determine if a suspicious code change is a real vulnerability. VulnVibes works in two stages: first threat modeling the PR diff to identify security-relevant changes, then performing cross-repo investigation by reading infrastructure configs (Docker Compose, nginx), checking for security controls, and following vulnerability-specific investigation playbooks.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Anshuman walks through running VulnVibes against microvibes-lab (a test org with auth-service, doc-api, frontend-app, and infra-ops repos), in which it correctly identified an SSRF vulnerability by tracing the attack path across three repos to confirm a flat Docker network and lack of WAF protection, made a nuanced call that a permissive CORS config was a false positive after verifying the codebase only uses header-based auth, and appropriately ignored a safe JWT refactoring.</p></div><p class="paragraph" style="text-align:left;">💡 Being able to reason about the impact and relevance of a potential vulnerable across multiple repos is super cool, and very relevant in complex environments. I expect to see more work in this space, neat that Anshuman has open sourced his prototype 🫡 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.synthesia.io/post/scaling-vulnerability-management-with-ai-what-actually-worked?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Scaling Vulnerability Management with AI: What Actually Worked</a><br>Synthesia’s <a class="link" href="https://www.linkedin.com/in/gbrindisi/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Gianluca Brindisi</a> describes how they built an AI-powered vulnerability management system that auto-triages SAST and SCA findings using layered automation: severity-based filtering, Semgrep Assistant for false positive detection, and EPSS/reachability analysis for supply chain issues. They automatically turn remaining high severity findings into GitHub issues with structured context (links to code, Semgrep analysis, severity, and the triggering rule), and then spin up three independent coding agents via GitHub workflows to validate vulnerabilities through consensus voting, then automatically generate fix PRs for confirmed true positives. </p><p class="paragraph" style="text-align:left;">They reduced their backlog by 60% initially through archiving stale repos, and now the system processes the remaining findings with minimal human intervention: only 11% of findings require manual security review. For confirmed true positives, the <code>true-positive</code> label triggers an agent to create a branch, implement a secure fix, and open a pull request. “The PR enters the repo&#39;s normal review flow. Instead of starting from a security ticket and a blank editor, the developer now reviews a proposed fix with the vulnerability context already embedded.”</p><p class="paragraph" style="text-align:left;">💡 This is great security engineering 👌 I love the focus on thoughtfully prioritizing/risk rating repos and findings, benchmarking and evaluating the AI workflow steps, and automating parts of the triage and PRs fixing the code. Neat!</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/HQ1995/vibe-security-radar?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">HQ1995/vibe-security-radar</a><br>Georgia Tech SSLab’s <a class="link" href="https://x.com/hankein95?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Hanqing Zhao</a> has built <a class="link" href="https://vibe-radar-ten.vercel.app/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Vibe Security Radar</a>, a tool that scans public CVE databases (OSV, GitHub Advisory Database, NVD) to identify vulnerabilities introduced by AI-generated code by tracing fix commits back through git blame, detecting AI tool signatures (co-author trailers, bot emails, commit message markers from 15+ tools), and verifies causality with an LLM investigator. So far: 74 AI-linked CVEs, 39 Critical / High, ~44K advisories scanned.</p><p class="paragraph" style="text-align:left;">💡 I think there&#39;s actually a lot of nuance around measuring the security of LLM-generated code. For example:</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Was the developer using any security-related prompts, context, or tooling?</p><ol start="1"><li><p class="paragraph" style="text-align:left;">The model may have written more secure code if it was asked, but it wasn&#39;t. </p></li></ol></li><li><p class="paragraph" style="text-align:left;">Bug density - If humans ship bugs at say 2 per 1,000 LOC, and LLMs are twice as good (1 bug per 1K LOC), if LLMs are now writing 10X as much code, that ends up still introducing more bugs.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">If LLMs write fewer bugs than humans, should we prefer using them, even if they still introduce bugs? (e.g. Does Waymo need to be safer than human drivers or never make mistakes?)</p></li></ol></li></ol><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Claude Code source map leak</p><ul><li><p class="paragraph" style="text-align:left;">Anthropic shipped a source map file in the Claude Code npm package, exposing the full unobfuscated TypeScript source (~1,900 files, 512K+ lines). It’s also suspiciously close to April Fools Day 🤔 Maybe it’s real though? (<a class="link" href="https://x.com/trq212/status/2039202140158398706?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Thariq tweet</a>)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://aired.sh/p/Zlm4dmW4ED?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Claude Code Hidden Features</a> - 89 feature flags, unreleased autonomous agents, companion pets, anti-distillation systems, and more — extracted from 1,809 source files.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/nblintao/awesome-claude-code-postleak-insights?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">nblintao/awesome-claude-code-postleak-insights</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/instructkr/claw-code?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">instructkr/claw-code</a> - Someone took Claude Code leak, then used Codex to port the core features to Python from scratch, and then ported it to Rust.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=Wvj1mTqyzsQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Theo’s video </a> - I think he’s overly negative and I don’t agree with all his points, but it has some reasonable context.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/d-WEYRqnOgY?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Dissecting the Bars While Rapping</a> - Harry Mack dissects what he’s doing in his rap (structurally, setting up rhymes), while rapping about it. Insane 🤯 </p></li><li><p class="paragraph" style="text-align:left;">404 Media - The company WebinarTV is <a class="link" href="https://www.404media.co/this-company-is-secretly-turning-your-zoom-calls-into-ai-podcasts/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">secretly scanning the Internet for Zoom meeting links</a>, recording the calls, and turning them into AI-generated podcasts for profit.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.rice.is/post/doom-over-dns/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Can it Resolve DOOM? Game Engine in 2,000 DNS Records</a> - As DNS TXT records can store arbitrary text, <a class="link" href="https://www.linkedin.com/in/africe/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Adam Rice</a> was able compress and play DOOM from 1,966 TXT records on a single CloudFlare Pro DNS zone. 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2026/03/27/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Apple says no one using Lockdown Mode has been hacked with spyware</a> in the four years since it’s been launched. This is impressive, and a great example of eliminating vulnerability classes/raising the security bar at scale 🤘 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/efZZ46JMieM?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Matt Rife exposes Tik Tok shadow ban on standup comedy</a></p></li><li><p class="paragraph" style="text-align:left;">Gabor Mate to Hasan Minaj - <a class="link" href="https://www.youtube.com/shorts/0IWp5BJnRWY?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Kids Speak Where It’s Safe</a> 😭 </p></li><li><p class="paragraph" style="text-align:left;">Alex Hormozi - <a class="link" href="https://www.youtube.com/watch?v=9q5ojtkqsBs&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">How to Win With AI in 2026</a></p></li><li><p class="paragraph" style="text-align:left;">Good Work - <a class="link" href="https://www.youtube.com/watch?v=0tLEszJs7hc&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Why fun tech jobs went extinct</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/osaFXfP7pBI?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">7 months underwater on a nuclear submarine</a> - Fascinating!</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Politics / Privacy</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Iran-linked hackers breach FBI director&#39;s personal email, publish photos and documents</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://apnews.com/article/iran-war-security-cameras-surveillance-5f9a1fe5845d94894f3edd50af560d3a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Iran built a vast camera network to control dissent. Israel turned it into a targeting tool</a> - Allegedly Israel hijacked Iran’s street cameras in order to successfully track and target Iran’s supreme leader. “Experts say advances in AI have allowed militaries to overcome a critical hurdle in weaponizing hacked footage: sifting through huge amounts of video to identify people, vehicles, and other targets.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/DlFsG?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Using a VPN May Subject You to NSA Spying</a> - Because VPNs obscure a user’s true location, and because intelligence agencies presume communications of unknown origin are foreign, that may give the NSA the authority to intercept the communication without a warrant.</p></li><li><p class="paragraph" style="text-align:left;">EU Disinfo Lab - <a class="link" href="https://www.disinfo.eu/disinfo-update-12-11-2025-2-2-2-2/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">Disinfo Update 12/11/2025</a> - I haven’t come across this lab before so I’m not sure about the trustworthiness, but it has some interesting links around topics including: the X algorithm amplifying right-wing and extreme content, Meta’s profits being tied to scam ads, Russia recruiting fighters from other companies, Israel paying US influencers to boost its image, AI chatbots repeating Russian propaganda, and more.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-322-github-s-supply-chain-roadmap-scaling-vulnerability-management-with-ai-finding-vulnerabilities-across-repos" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=03028f42-733f-4d8e-874b-ae3eb10e967d&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>How we made Trail of Bits AI-native (so far)</title>
  <description>We had 5% buy-in and 95% resistance. A year later, AI-augmented auditors are finding 200 bugs a week on the right engagements. Here&#39;s the six-part operating system we built, open sourced, and are giving away.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2d0fc235-8b10-4098-9d48-22abc34c2cc4/title_slide.jpg" length="80923" type="image/jpeg"/>
  <link>https://tldrsec.com/p/how-we-made-trail-of-bits-ai-native-so-far</link>
  <guid isPermaLink="true">https://tldrsec.com/p/how-we-made-trail-of-bits-ai-native-so-far</guid>
  <pubDate>Tue, 31 Mar 2026 11:30:00 +0000</pubDate>
  <atom:published>2026-03-31T11:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <dc:creator>Dan Guido</dc:creator>
    <category><![CDATA[Blog]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Editor’s note: I’ve been a fan of Trail of Bits’ and </i><a class="link" href="https://www.linkedin.com/in/danguido/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow"><i>Dan Guido</i></a><i>’s work for a number of years. Dan’s [un]prompted talk on how he changed ToB’s culture is one of the best resources I’ve seen on how to get your company to adapt the mindset and practices to thrive in today’s rapidly changing environment. So I was thrilled that he was willing to guest post the blog version of his talk on tl;dr sec. Enjoy! -Clint</i></p><hr class="content_break"><p class="paragraph" style="text-align:left;"><i>This post is adapted from a talk I gave at </i><a class="link" href="https://unpromptedcon.org/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow"><i>[un]prompted</i></a><i>, the AI security practitioner conference. Thanks to </i><a class="link" href="https://twitter.com/gadievron?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow"><i>Gadi Evron</i></a><i> for inviting me to speak. You can watch the recorded presentation below or download the </i><a class="link" href="https://github.com/trailofbits/publications/blob/master/presentations/How%20we%20made%20Trail%20of%20Bits%20AI-Native%20(so%20far)/slides.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow"><i>slides.</i></a></p><p class="paragraph" style="text-align:left;">Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead.</p><p class="paragraph" style="text-align:left;">A year ago, about 5% of Trail of Bits was on board with our AI initiative. The other 95% ranged from passively skeptical to actively resistant. Today we have 94 plugins, 201 skills, 84 specialized agents, and on the right engagements, AI-augmented auditors finding 200 bugs a week. This post is the playbook for how we got there. We <a class="link" href="https://github.com/trailofbits/skills?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">open sourced most of it</a>, so you can steal it today.</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/kgwvAyF7qsA" width="100%"></iframe><p class="paragraph" style="text-align:left;">A <a class="link" href="https://fortune.com/2026/02/17/ai-productivity-paradox-ceo-study-robert-solow-information-technology-age/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">recent Fortune article</a> reported that a <a class="link" href="https://www.nber.org/papers/w34984?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">National Bureau of Economic Research study</a> of 6,000 executives across the U.S., U.K., Germany, and Australia found AI had no measurable impact on employment or productivity. Two-thirds of executives said they use AI, but actual usage came out to 1.5 hours per week, and 90% of firms reported zero impact. Economists are calling it the new Solow paradox, referencing the pattern Robert Solow identified in 1987: &quot;you can see the computer age everywhere but in the productivity statistics.&quot;</p><p class="paragraph" style="text-align:left;">AI works. Most companies are using it wrong. They give people tools without changing the system. That&#39;s the gap between AI-assisted and AI-native. One is a tool, the other is an operating system.</p><h2 class="heading" style="text-align:left;" id="what-a-inative-actually-means">What AI-native actually means</h2><p class="paragraph" style="text-align:left;">&quot;AI-native&quot; gets thrown around a lot. The way I think about it, there are three levels:</p><p class="paragraph" style="text-align:left;"><b>AI-assisted</b> is where almost everyone starts. You give people access to ChatGPT or Claude. They use it to draft emails, generate boilerplate, summarize documents. It&#39;s a productivity tool. The org doesn&#39;t change. The workflows don&#39;t change. You just do the same things a little faster.</p><p class="paragraph" style="text-align:left;"><b>AI-augmented</b> is where you start redesigning workflows. You&#39;re not just using AI as a tool. You&#39;re putting agents in the loop, changing how work actually flows. Maybe the AI does the first pass on a code review and the human does the second. The process itself is different.</p><p class="paragraph" style="text-align:left;"><b>AI-native</b> is the structural shift. The org is designed from the ground up assuming AI is a core participant. Not a tool you pick up, but a teammate that&#39;s always there. Your knowledge management, your delivery model, your expertise, all designed to be consumed and amplified by agents.</p><p class="paragraph" style="text-align:left;">At Trail of Bits, what this means concretely: our security expertise compounds as code. Every engagement we do, the skills and workflows we build make the next engagement faster. Every engineer operates with an arsenal of specialized agents built from 14 years of audit knowledge. That&#39;s not &quot;we use AI.&quot; That&#39;s &quot;AI is on the team.&quot;</p><h2 class="heading" style="text-align:left;" id="what-people-are-actually-resisting">What people are actually resisting</h2><p class="paragraph" style="text-align:left;">When I first launched this initiative inside Trail of Bits, there was an incredible amount of pushback. Studies of technology adoption consistently show the same thing: the problem is never the software. It&#39;s people&#39;s unwillingness to accept that something else might be better than their intuition. I had to understand four specific psychological barriers before I could design a system that works within them.</p><p class="paragraph" style="text-align:left;"><b>Self-enhancing bias.</b> We overestimate our own judgment. Paul Meehl and Robyn Dawes <a class="link" href="https://www.cmu.edu/dietrich/sds/docs/dawes/the-robust-beauty-of-improper-linear-models-in-decision-making.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">showed</a> that if you take the variables an expert says they use and build even a crude linear model, the model outperforms the expert. Not because it&#39;s smarter, but because it applies the same weights every time. You don&#39;t. You&#39;re hungover some days, distracted others, and you never notice because you take credit for your wins and blame external factors for your misses. This gets worse with seniority. The more expert you are, the more you trust your gut, and the less you believe a machine could do better. As <a class="link" href="https://www.gsb.stanford.edu/faculty-research/faculty/jonathan-levav?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">Jonathan Levav</a> frames it: the more unique you feel you are, the more you resist a machine making decisions for you.</p><p class="paragraph" style="text-align:left;"><b>Identity threat.</b> In <a class="link" href="https://journals.sagepub.com/doi/abs/10.1177/0022243718818423?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">one study</a>, researchers showed people the same kitchen automation device framed two ways: &quot;does the cooking for you&quot; versus &quot;helps you cook better.&quot; People who identified as cooks rejected the first framing and accepted the second, for the same device. There&#39;s a symbolic dimension too: people don&#39;t want robots giving them tattoos (human craft), but they&#39;re fine with a tattoo-<i>removing</i> robot (instrumental, no symbolism). Security auditing is symbolic work. AI that replaces skill feels like an attack on who you are.</p><p class="paragraph" style="text-align:left;"><b>Intolerance for imperfection.</b> Dietvorst et al. <a class="link" href="https://marketing.wharton.upenn.edu/wp-content/uploads/2016/10/Dietvorst-Simmons-Massey-2014.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">ran a study</a> where participants watched an algorithm outperform a human forecaster. But after seeing the algorithm make one error, they abandoned it and went back to the human, even though the human was demonstrably worse. We forgive our own mistakes but not the machine&#39;s. <a class="link" href="https://pubsonline.informs.org/doi/10.1287/mnsc.2016.2643?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">Their follow-up</a> found the fix: let people modify the algorithm. Even one adjustable parameter was enough to overcome the aversion.</p><p class="paragraph" style="text-align:left;"><b>Opacity.</b> A <a class="link" href="https://www.nature.com/articles/s41562-021-01146-0?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">2021 study in Nature Human Behaviour</a> found that people&#39;s subjective understanding of human judgment is high and AI judgment is low, but objective understanding of both is near zero. People feel like they understand how a doctor diagnoses. They can&#39;t explain it either. The feeling of not understanding kills the feeling of control.</p><h2 class="heading" style="text-align:left;" id="the-remedies-that-actually-worked">The remedies that actually worked</h2><p class="paragraph" style="text-align:left;">We designed the system around the resistance, not against it.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/aa9cd8b5-a0c3-489e-8698-1b47072587cf/remedies.jpg?t=1774918016"/></div><p class="paragraph" style="text-align:left;">For <b>self-enhancing bias</b>, we built a maturity matrix. Nobody likes being told they&#39;re at level 1. But that&#39;s the point: you can&#39;t argue you&#39;re already good enough when there&#39;s a visible ladder. It makes the conversation concrete instead of &quot;I don&#39;t think AI is useful.&quot; It also creates social proof. When you see peers at level 2 or 3, the passive majority starts moving.</p><p class="paragraph" style="text-align:left;">For <b>identity threat</b>, we never asked anyone to stop being a security expert. We gave them a new way to express that identity. When a senior auditor writes a constant-time-analysis skill, they&#39;re not being replaced. They&#39;re becoming more permanent. Their expertise is encoded and reusable. That&#39;s an identity upgrade, not a threat. The maturity matrix reinforces this: level 3 isn&#39;t &quot;uses AI the most.&quot; It&#39;s &quot;invents new ways, builds tools.&quot; The identity of the expert shifts from &quot;I don&#39;t need AI&quot; to &quot;I&#39;m the one who makes the AI dangerous.&quot;</p><p class="paragraph" style="text-align:left;">For <b>intolerance for imperfection</b>, we invested heavily in reducing the ways AI can fail embarrassingly. A curated marketplace means no random plugins with backdoors. Sandboxing means Claude Code can&#39;t accidentally delete your work. Guardrails and footgun reduction mean fewer &quot;AI did something stupid&quot; stories circulating in Slack. If someone&#39;s first AI experience is bad, you&#39;ve lost them for months.</p><p class="paragraph" style="text-align:left;">For <b>opacity</b>, we wrote an AI Handbook that made everything concrete: here&#39;s what&#39;s approved, here&#39;s what&#39;s not, here are the exceptions, here&#39;s who to ask. Clear rules restored the feeling of control.</p><p class="paragraph" style="text-align:left;">And underlying everything: we made adoption visible and fast. Deferred benefits kill adoption. If setup takes an hour and the first result is mediocre, you&#39;ve confirmed every skeptic&#39;s priors. Copy-pasteable configs, one-command setup, standardized toolchain, all designed so the first experience is fast and good. And the CEO going first matters more than people think. The passive 50% watches what leadership actually does, not what it says.</p><h2 class="heading" style="text-align:left;" id="the-operating-system-model">The operating system model</h2><p class="paragraph" style="text-align:left;">Here&#39;s the actual system we built. Six parts, each designed to address the barriers I just described:</p><div style="padding:14px 15px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="33%"><p class="paragraph" style="text-align:left;">Barrier</p></th><th class="bh__table_header" width="33%"><p class="paragraph" style="text-align:left;">Core problem</p></th><th class="bh__table_header" width="33%"><p class="paragraph" style="text-align:left;">What we built</p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Self-enhancing bias</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">&quot;I&#39;m already good enough&quot;</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Maturity Matrix with visible levels and real consequences</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Identity threat</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">&quot;AI is replacing who I am&quot;</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Skills repos + hackathons that reward building, not just using</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Intolerance for imperfection</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">One bad experience = months lost</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Curated marketplace, sandboxing, guardrails</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">Opacity / trust </p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">&quot;I don&#39;t understand how it decides&quot;</p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;">AI Handbook that explains the risk model, not just the rules</p></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Pick a standard toolchain</b> so you can support it</p></li><li><p class="paragraph" style="text-align:left;"><b>Write the rules</b> so risk conversations stop being ad hoc</p></li><li><p class="paragraph" style="text-align:left;"><b>Create a capability ladder</b> so improvement is expected, measurable, and rewarded</p></li><li><p class="paragraph" style="text-align:left;"><b>Run tight adoption sprints</b> so the org keeps pace with releases</p></li><li><p class="paragraph" style="text-align:left;"><b>Package the learnings</b> into reusable artifacts (repos, configs, sandboxes) so the system compounds</p></li><li><p class="paragraph" style="text-align:left;"><b>Make autonomy safe</b> with sandboxing, guardrails, and hardened defaults</p></li></ol><p class="paragraph" style="text-align:left;">This isn&#39;t a strategy deck we wrote and handed to someone. We built every piece ourselves, open sourced most of it, and iterated on it in production with a 140-person company doing real client work.</p><h3 class="heading" style="text-align:left;" id="standardize-on-tools">Standardize on tools</h3><p class="paragraph" style="text-align:left;">Step one was boring but critical: we standardized. We got everyone on Claude Code, and we treat it like any other enterprise tool: supported configs, known-good defaults, and a clear path to &quot;this is how we do it here.&quot;</p><p class="paragraph" style="text-align:left;">If you skip this step, you can&#39;t build anything else. You end up with 40 different workflows and zero leverage.</p><h3 class="heading" style="text-align:left;" id="write-the-rules">Write the rules</h3><p class="paragraph" style="text-align:left;">We wrote an AI Handbook. Not to teach people how to prompt. It&#39;s there to remove ambiguity.</p><p class="paragraph" style="text-align:left;">The key part is the usage policy: what tools are approved, what isn&#39;t, especially for sensitive data. Cursor can&#39;t be used on client code (except blockchain engagements; use Claude Code or <a class="link" href="https://Continue.dev?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">Continue.dev</a> instead). Meeting recorders are disallowed for client meetings conducted under legal privilege. Now, when a client asks what we&#39;re using on their codebase, everyone gives the same answer.</p><p class="paragraph" style="text-align:left;">The handbook doesn&#39;t just list what&#39;s approved. It explains the risk model behind each decision, so people understand <i>why</i>. That&#39;s what addresses the opacity barrier: not &quot;just trust this,&quot; but &quot;here&#39;s our reasoning.&quot; Once you have policy, you can safely push harder on adoption.</p><h3 class="heading" style="text-align:left;" id="make-it-measurable">Make it measurable</h3><p class="paragraph" style="text-align:left;">We built an AI Maturity Matrix that makes AI usage a first-class professional capability, like &quot;can you use Git&quot; or &quot;can you write tests.&quot;</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7fd48d28-31ec-43d6-83ab-48e1927ed07d/ai_maturity_matrix.png?t=1774918140"/><div class="image__source"><span class="image__source_text"><p>Trail of Bits AI Maturity Matrix, as of March 2026</p></span></div></div><p class="paragraph" style="text-align:left;">It&#39;s not a vibe. It&#39;s a ladder: clear levels, clear expectations, a clear path up, and real consequences for staying stuck. What level 3 looks like depends on your role. An engineer at level 3 builds agent systems that ship PRs and close issues autonomously. A sales rep at level 3 has agents producing pipeline reports and QBR prep without hand-holding. An auditor at level 3 runs agents that execute full analysis passes and produce findings, triage, and report drafts.</p><p class="paragraph" style="text-align:left;">This is how you avoid two failure modes: leadership wishing adoption into existence, and the org splitting into &quot;AI people&quot; and everyone else.</p><h3 class="heading" style="text-align:left;" id="create-an-adoption-engine">Create an adoption engine</h3><p class="paragraph" style="text-align:left;">We run hackathons as a management system: short, focused sprints of 2-3 days with one objective. They&#39;re how we keep pace when the ecosystem changes every week.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a60a1c2f-2e0b-42be-912d-6c0b2ea141ad/hackathons.png?t=1774918186"/><div class="image__source"><span class="image__source_text"><p>Claude Code Hackathon v2: Autonomous Agents</p></span></div></div><p class="paragraph" style="text-align:left;">One recent example: &quot;Claude Code Hackathon v2: Autonomous Agents.&quot; The two lines that mattered were:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Objective:</b> Ship the most impactful changes across our AI toolchain and public repos</p></li><li><p class="paragraph" style="text-align:left;"><b>Twist:</b> Engineers must work in bypass permissions mode (fully autonomous agent, not approve-every-action)</p></li></ul><p class="paragraph" style="text-align:left;">That twist is intentional. It forces everyone to learn the real constraints: sandboxing, guardrails, and how to structure work so agents can succeed.</p><p class="paragraph" style="text-align:left;">A few design choices matter here: we focus on public repos so we can move fast and show real outcomes. We measure success by activity (issues filed/fixed, PRs reviewed/merged), not lines of code. Everyone works in pairs, and every change gets reviewed by a buddy. Even the &quot;move fast&quot; sprint has quality control built in.</p><h3 class="heading" style="text-align:left;" id="capture-the-work-as-reusable-artifa">Capture the work as reusable artifacts</h3><p class="paragraph" style="text-align:left;">Hackathons create motion. But motion doesn&#39;t compound unless you capture it.</p><p class="paragraph" style="text-align:left;">The most important artifact is a <b>skills repo</b>. Skills are reusable, structured workflows, ideally with examples, constraints, and a way to verify output. We maintain an internal skills repo for company-specific workflows and an <a class="link" href="https://github.com/trailofbits/skills?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">external skills repo</a> so the broader community can validate and improve what we&#39;re doing.</p><p class="paragraph" style="text-align:left;">We also created a <a class="link" href="https://github.com/trailofbits/skills-curated?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow"><b>curated marketplace</b></a>, a &quot;known good&quot; place for third-party skills. Once you tell people &quot;go use skills and plugins,&quot; they&#39;ll install random stuff. This is basic enterprise thinking applied to agent tooling: if you want adoption, you need a safe supply chain.</p><p class="paragraph" style="text-align:left;">We made <b>defaults copy-pasteable</b>. We built a <a class="link" href="https://github.com/trailofbits/claude-code-config?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">repo that centralizes recommended Claude Code configuration</a> so onboarding isn&#39;t tribal knowledge. This is where we put known-good settings, recommended patterns for personal <code>~/.claude/CLAUDE.md</code>, and anything we want to standardize.</p><p class="paragraph" style="text-align:left;">We made <b>sandboxing the default</b>. If you want autonomous agents, you need sandboxing. We give people multiple safe lanes: a <a class="link" href="https://github.com/trailofbits/claude-code-devcontainer?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">devcontainer option</a>, <a class="link" href="https://code.claude.com/docs/en/sandboxing?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">native macOS sandboxing</a>, and <a class="link" href="https://github.com/trailofbits/dropkit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">Dropkit</a>. The point isn&#39;t that everyone uses the same sandbox. The point is everyone has a safe sandbox, and it&#39;s easy to adopt.</p><p class="paragraph" style="text-align:left;">We <b>reduced footguns</b>. We hardened defaults through MDM. For example, we rolled out more secure package manager defaults via Jamf, including <a class="link" href="https://socket.dev/blog/npm-introduces-minimumreleaseage-and-bulk-oidc-configuration?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">mandatory package cooldown policies</a>. The easiest way to reduce risk is to make the default path the safe path.</p><p class="paragraph" style="text-align:left;">Finally, we <b>connected agents to real tools</b>. Once you have policy, guardrails, sandboxes, and skills, you can connect agents to real tools. One example we&#39;ve published is an <a class="link" href="https://github.com/trailofbits/slither-mcp?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">MCP server for Slither</a>. Even if you don&#39;t care about Slither specifically, the point is: MCP turns your internal tools into something agents can use reliably, and your org can govern.</p><h2 class="heading" style="text-align:left;" id="results-so-far">Results so far</h2><p class="paragraph" style="text-align:left;">Let me give you some numbers on what this system actually produced.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7370a266-7c92-420d-bf42-966fa1c8c69e/results.jpeg?t=1774918898"/><div class="image__source"><span class="image__source_text"><p>The numbers that got the room&#39;s attention at [un]prompted</p></span></div></div><p class="paragraph" style="text-align:left;"><b>Tooling scale:</b> Across our internal and public skills repos, we have 94 plugins containing 201 skills, 84 specialized agents, 29 commands, 125 scripts, and over 414 reference files encoding domain expertise. That&#39;s the compounding effect: every engagement, every auditor, every experiment adds to the arsenal.</p><p class="paragraph" style="text-align:left;">The breadth matters. We have skills for writing sales proposals, tracking project hours, onboarding new hires, prepping conference blog posts, and delivering government contract reports. The internal repo has 20+ plugins targeting specific vulnerability classes: ERC-4337, merkle trees, precision loss, slippage, state machines, CUDA/Rust review, integer arithmetic in Go. Each one packages expertise that used to live in someone&#39;s head into something any auditor can invoke.</p><p class="paragraph" style="text-align:left;"><b>Delivery impact:</b> For certain clients where the codebase and scope allow it, we went from finding about 15 bugs a week to 200. An auditor runs a fleet of specialized agents doing targeted analysis across an entire codebase in parallel, then validates the results.</p><p class="paragraph" style="text-align:left;">About 20% of all bugs we report to clients are now initially discovered by AI in some form. They go into real client reports. An auditor validates every one, but the AI is surfacing things humans would have missed or wouldn&#39;t have had time to look for.</p><p class="paragraph" style="text-align:left;"><b>Business impact:</b> Our sales team averages \$8M in revenue per rep against a consulting industry benchmark of \$2-4M. The sales team uses the same skills repos for proposal drafting, competitive positioning, conference prep, and lead enrichment. Same system, same compounding effect.</p><p class="paragraph" style="text-align:left;">And this is maybe a year into building the system seriously. The models are getting better every month. The skills repo grows every week.</p><h2 class="heading" style="text-align:left;" id="open-questions">Open questions</h2><p class="paragraph" style="text-align:left;">Here&#39;s what we&#39;re actively working on and don&#39;t have great answers for yet.</p><p class="paragraph" style="text-align:left;"><b>Private inference.</b> We want local models for cost and confidentiality, but open models aren&#39;t good enough yet. There&#39;s still a significant gap versus the best closed models on coding benchmarks. We&#39;re evaluating on-prem inference servers to run 230B+ models at full precision. Key insight: speed drives adoption more than capability. Nobody uses a slow model, even if it&#39;s smart. In the meantime, private inference providers like <a class="link" href="https://tinfoil.sh?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">Tinfoil.sh</a> (confidential computing on NVIDIA GPUs, cryptographically verifiable) are getting compelling.</p><p class="paragraph" style="text-align:left;"><b>Prompt injection and client code protection.</b> This is an existential question for using AI on client code. The data the agent works on is inherently accessible to it. Today we use blunt instruments: sensitive clients mean no web access. Longer term, we&#39;re looking at agent-native shells like <a class="link" href="https://github.com/always-further/nono?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">nono</a> and <a class="link" href="https://github.com/erans/agentsh?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">agentsh</a> that enforce policy at the kernel level.</p><p class="paragraph" style="text-align:left;"><b>Policy enforcement and continuous learning.</b> We push settings via MDM, but we&#39;re not yet pulling signal back. The goal is to turn the whole company into a feedback loop that improves the operating system weekly. One possible long-term architecture: a <a class="link" href="https://stripe.dev/blog/minions-stripes-one-shot-end-to-end-coding-agents-part-2?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">master MCP server between agents and internal resources</a>, enforcing policy server-side. We&#39;re not there yet.</p><p class="paragraph" style="text-align:left;"><b>The future of consulting.</b> This is the one that keeps me up at night. The consulting business model assumes you&#39;re billing for time, and that time roughly correlates with expertise. But when some people can outperform others by orders of magnitude with the right agent setup, that correlation breaks. The question shifts from &quot;how many hours did the auditor spend&quot; to &quot;did the auditor know where to point the agents and which findings are real.&quot;</p><p class="paragraph" style="text-align:left;">We don&#39;t have the answer yet. But the nature of how Trail of Bits offers services will probably change in the next 6 to 12 months. Audit scoping, pricing, deliverables, all of it is on the table. The firms that figure this out first will have a structural advantage, and the ones that keep billing by the hour will watch their margins compress as their competitors ship more in less time. We&#39;re not waiting to find out which side we&#39;re on.</p><h2 class="heading" style="text-align:left;" id="the-replicable-recipe">The replicable recipe</h2><p class="paragraph" style="text-align:left;">If you want to copy this, copy the system, not the specific tools:</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Standardize on one agent workflow you can support</p></li><li><p class="paragraph" style="text-align:left;">Write an AI Handbook so risk decisions aren&#39;t ad hoc</p></li><li><p class="paragraph" style="text-align:left;">Create a capability ladder so improvement is expected</p></li><li><p class="paragraph" style="text-align:left;">Run short adoption sprints that force hands-on usage</p></li><li><p class="paragraph" style="text-align:left;">Capture everything as reusable artifacts: skills + configs + curated supply chain</p></li><li><p class="paragraph" style="text-align:left;">Make autonomy safe with sandboxing + guardrails + hardened defaults</p></li></ol><p class="paragraph" style="text-align:left;">That&#39;s what we&#39;ve done so far, and it&#39;s already changed how fast we can ship and how quickly we can adapt.</p><h2 class="heading" style="text-align:left;" id="resources">Resources</h2><p class="paragraph" style="text-align:left;">All of our tooling is open source:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/skills?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits/skills</a> - Our public skills repository</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/skills-curated?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits/skills-curated</a> - Curated third-party skills marketplace</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/claude-code-config?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits/claude-code-config</a> - Recommended Claude Code configurations</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/claude-code-devcontainer?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits/claude-code-devcontainer</a> - Devcontainer for sandboxed development</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/dropkit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits/dropkit</a> - macOS sandboxing for agents</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/slither-mcp?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits/slither-mcp</a> - MCP server for Slither</p></li></ul><p class="paragraph" style="text-align:left;">We&#39;re hiring! We&#39;re looking for an <a class="link" href="https://apply.workable.com/j/B85863C121?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">AI Systems Engineer</a> to work directly with me on accelerating everything in this post, and a <a class="link" href="https://apply.workable.com/j/4A48CBB705?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">Head of Application Security</a> to lead a team of about 15 exceptionally overperforming consultants. Check out <a class="link" href="https://trailofbits.com/careers?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=how-we-made-trail-of-bits-ai-native-so-far" target="_blank" rel="noopener noreferrer nofollow">trailofbits.com/careers</a>.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=0d951cd6-67cf-4a55-b461-cff5738f0856&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #321 - Sandboxing AI Agents, Trivy Compromised, Pentesting AWS&#39; AI Pentester</title>
  <description>Sandbox approaches by NVIDIA and Niel Provos, moar supply chain compromises, vulnerabilities in AWS Security Agent</description>
  <link>https://tldrsec.com/p/tldr-sec-321</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-321</guid>
  <pubDate>Thu, 26 Mar 2026 14:30:00 +0000</pubDate>
  <atom:published>2026-03-26T14:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">👨‍💼 I Will Survive</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Phew, stay strong my friends, we’re almost through the BSidesSF and RSAC montage ✊ </p><p class="paragraph" style="text-align:left;">Too many to list them all, but some quick thoughts and moments that stuck out:</p><ul><li><p class="paragraph" style="text-align:left;">Thank you to everyone who come to the inaugural <i>tl;dr sec</i> community meet-up! I had a blast 🥰 Also shout-out to Scott Behrens and Travis McPeak for joining me for a fireside chat.</p></li><li><p class="paragraph" style="text-align:left;">Anna Westelius gave an inspiring BSidesSF keynote about reasons for us security folks to be optimistic.</p></li><li><p class="paragraph" style="text-align:left;">It was fun joining my friends Ken Johnson, Seth Law, Kevin McDermott, and Astha Singhal on an Absolute AppSec panel at BSidesSF.</p></li><li><p class="paragraph" style="text-align:left;">Delicious KBBQ with a bunch of other security creator nerds, H/T Ashish and Shilpi of the Cloud Security Podcast for organizing!</p></li><li><p class="paragraph" style="text-align:left;">Huge thanks to Decibel’s Dan Nguyen-Huu and Jon Sakoda for hosting an awesome set of lightning talks, which my bud Daniel Miessler also helped organize. Great talks from Rob Ragan, Jackie Bow, Andrew Becherer, and Sydney Marrone! </p><ul><li><p class="paragraph" style="text-align:left;">Dave Aitel choosing the Imperial March from Star Wars as his intro music was delightful 😂 </p></li></ul></li><li><p class="paragraph" style="text-align:left;">Randomly meeting former NSA Director Rob Joyce! H/T Lina Lau, whose company is working on some impactful stuff 👀 </p></li><li><p class="paragraph" style="text-align:left;">Hearing from folks who were moved by my talk last BSidesSF about vulnerability 🥹 This had the biggest impact on me.</p></li></ul><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9e7ee9b8-f5b3-4e4c-be20-d689f6614d19/image.png?t=1774513318"/><div class="image__source"><span class="image__source_text"><p>Security creator friends!</p></span></div></div><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>AI is Expanding Your Attack Surface. </b><br><b>Can You Secure It?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">AI adoption is accelerating across cloud environments, from LLMs to autonomous agents and complex data pipelines. But without dedicated AI security posture management (AI-SPM), these innovations introduce a new class of risks that traditional tools can’t address.</p><p class="paragraph" style="text-align:left;">From exposed training data to overprivileged AI agents, the attack surface is expanding faster than security teams can keep up.</p><p class="paragraph" style="text-align:left;">Download the guide to learn a five-step framework to gain visibility, assess risk and secure AI across your cloud environment.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.paloaltonetworks.com/resources/whitepapers/close-ai-security-gap?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow"><b>Download guide</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">Having visibility into the AI usage in your environment is important, and unfortunately not always easy 😅 I hear from lots of security leaders working on securing AI usage these days.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/ChiChou/vscode-frida?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">ChiChou/vscode-frida</a><br>A VSCode extension providing comprehensive IDE for <a class="link" href="https://frida.re/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Frida</a> dynamic instrumentation, featuring a sidebar for listing apps/processes on local/USB/remote devices, interactive panels for browsing modules/exports and classes/methods (Java/Objective-C), and one-click hook generation for native functions, ObjC selectors, and Java methods.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://pentesterlab.com/blog/freshrss-bcrypt-truncation-auth-bypass?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">How &quot;Strengthening Crypto&quot; Broke Authentication: FreshRSS and bcrypt&#39;s 72-Byte Limit</a><br>Pentester Lab&#39;s <a class="link" href="https://twitter.com/snyff?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Louis Nyffenegger</a> analyzes CVE-2025-68402, an authentication bypass in the development branch of FreshRSS a self-hosted RSS aggregator, caused by a &quot;strengthen crypto&quot; commit that replaced SHA-1 (40 chars) with SHA-256 (64 chars) for nonce generation. The longer nonce, when concatenated with the bcrypt hash before verification, pushed the password-dependent portion of the hash beyond bcrypt&#39;s 72-byte truncation limit, meaning password_verify() only checked the nonce plus the algorithm identifier (<code>$2y$10$</code>) and one salt character, none of which depend on the actual password.</p><p class="paragraph" style="text-align:left;">&quot;A commit meant to strengthen the crypto ended up removing the need for a valid password.&quot; 😱 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📊 Cside Report: The Future of Web Security Depends on the Browser</h1><hr class="content_break"><p class="paragraph" style="text-align:left;">The browser runtime sits between your website &lt; &gt; customers, bots, AI agents, and fraudsters. No one is watching it. And agents now access websites on behalf of humans, adding the risk of consumer agents being manipulated by script injections from third-party code. Grab this report to see data on: the new threat of locally hosted stealth browsers, a 15x rise in user-action AI agents, 275% increase on discussions of bot traffic, and results of an industry survey on how practitioners are preparing against AI-agent driven website fraud.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://cside.com/research-report-future-of-web-security-2026?utm_source=tldr&utm_campaign=march26" target="_blank" rel="noopener noreferrer nofollow"><b>Get the Report from Cside</b></a><b> 👈 </b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">I could definitely see the bar rising for preventing AI-agent driven fraud or bot abuse given improvements in AI + browser use. I’m curious how the secure this new world.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Federal cyber experts called Microsoft’s cloud a “pile of s#!t,” approved it anyway</a> - Deep dive by <a class="link" href="https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">ProPublica</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://mazehq.com/blog/ai-remediation-developers-actually-want-to-use?utm_campaign=2026Q1-Global-Inbound-Newsletter-RemediationLaunch&utm_medium=newsletter&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow">AI Remediation Developers Will Actually Use</a><a class="link" href="https://mazehq.com/blog/ai-remediation-developers-actually-want-to-use?utm_campaign=2026Q1-Global-Inbound-Newsletter-RemediationLaunch&utm_medium=newsletter&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"> </a>- Every vulnerability tool tells you what&#39;s wrong. No one tells you how to actually fix it. Rebuild the image, bump a dependency, or apply a mitigation? The right answer depends on how it&#39;s built. Maze AI agents understand your environment and deliver the fix your team would actually use.* </p><ul><li><p class="paragraph" style="text-align:left;">This is a nice post on the nuances and challenges of auto-fixing.</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/dan-v/cloudshell-store?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">dan-v/cloudshell-store</a> - A distributed file store built on AWS CloudShell&#39;s free persistent storage. Chicanery of the highest order 🫡 </p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://iamtrail.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">IAMTrail</a><br>AWS silently updates Managed IAM policies all the time. This project by <a class="link" href="https://www.linkedin.com/in/grenuv/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Victor Grenu</a> tracks the full version history and diffs for 1525 AWS Managed IAM Policies, archived since 2019. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Pwning AI Code Interpreters in AWS Bedrock AgentCore</a><br>Friend of the newsletter BeyondTrust’s <a class="link" href="https://www.linkedin.com/in/kmcquade3/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-todo-todo-todo" target="_blank" rel="noopener noreferrer nofollow">Kinnaird McQuade</a> discovered that the AWS Bedrock AgentCore Interpreter’s Sandbox network mode (“complete isolation with no external access”) does allow public DNS queries. The post walks through using that capability to establish bidirectional communication (command and control, C2) using a custom tunneling protocol via DNS queries and responses, obtain a full interactive reverse shell, exfiltrating data, and performing command execution with the Code Interpreter’s IAM role. <a class="link" href="https://github.com/BeyondTrust/pwning-agentcore-code-interpreter/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">GitHub PoC</a>.</p><p class="paragraph" style="text-align:left;">Result: &quot;AWS communicated that a fix will not be made and it will change the documentation’s <b>description</b> of sandbox mode instead. AWS awarded the security researcher with a <b>$100 gift card</b> to the AWS Gear Shop.&quot; 😂</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://aws.amazon.com/blogs/security/inside-aws-security-agent-a-multi-agent-architecture-for-automated-penetration-testing?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Inside AWS Security Agent: A multi-agent architecture for automated penetration testing</a><br>AWS’ <a class="link" href="https://www.linkedin.com/in/tamer-alkhouli-538a326/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Tamer Alkhouli</a>, <a class="link" href="https://www.linkedin.com/in/divya-bhargavi/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Divya Bhargavi</a>, <a class="link" href="https://www.linkedin.com/in/dbonadiman/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Daniele Bonadiman</a> et al describe how AWS Security Agent works and how they benchmarked it. With CTF instructions and grader checks after each tool call it achieved 92.5% on <a class="link" href="https://github.com/uiuc-kang-lab/cve-bench?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">CVE Bench</a> v2.0, 80% without CTF instructions or grader feedback (more like real-world conditions), and 65% using an LLM whose knowledge cutoff date predates CVE Bench v1.0 release.</p><p class="paragraph" style="text-align:left;">See also <a class="link" href="https://linkedin.com/in/sena-yakut?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Sena Yakut</a>’s <a class="link" href="https://aws.plainenglish.io/aws-security-agent-penetration-testing-overview-e05cc62ce4f6?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">blog overview</a> on setting up AWS Security Agent and scanning DVWA. </p><p class="paragraph" style="text-align:left;">💡 This post actually had a pretty good amount of details and context, nice. I also found it interesting how performance dropped when using an LLM with knowledge cutoff before the CVE Bench release- is it doing better due to “memorizing” the answers or is it just a worse model because it’s older? 🤔 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.richardfan.xyz/2026/03/14/pentesting-a-pentest-agent-heres-what-ive-found-in-aws-security-agent.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Pentesting a pentest agent - Here&#39;s what I&#39;ve found in AWS Security Agent</a><br><a class="link" href="https://www.linkedin.com/in/richardfan1126/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Richard Fan</a> discovered five security vulnerabilities in AWS Security Agent, an autonomous AI pentesting tool, and discusses four of them (the 5th isn’t fixed yet).</p><ol start="1"><li><p class="paragraph" style="text-align:left;">The DNS confusion bug allowed attackers to manipulate Route53 private hosted zones to trick the agent into pentesting public domains they don&#39;t own by exploiting the &quot;Unreachable&quot; domain status and DNS record verification timing.</p></li><li><p class="paragraph" style="text-align:left;">Richard was able to trick the agent into hacking itself, obtaining a reverse shell with root access to the agent sandbox by injecting commands into debug messages, and escaping the container through the mounted /run/docker.sock to access the host EC2 instance and its IAM role credentials.</p></li><li><p class="paragraph" style="text-align:left;">He found the agent sometimes performs unnecessarily destructive actions like using <code>DROP TABLE</code> for SQL injection probes.</p></li><li><p class="paragraph" style="text-align:left;">The agent can expose unredacted passwords in pentest reports.</p></li></ol><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;">I’ve been doing BSidesSF/RSA stuff non-stop so I haven’t had time to fully get the lay of the land but it seems like a few things have been on fire. I wonder if the threat actors chose this week due to thinking defenders might be busy at conferences 🤔 Rude!</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Trivy Compromised</a> - By Wiz’s <a class="link" href="https://linkedin.com/in/ramimac?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://labs.boostsecurity.io/articles/teampcp-litellm-supply-chain-compromise?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">TeamPCP Compromises LiteLLM: Credential Stealer in PyPI, 70 Repos Exposed</a> - I love how this post by Boost Security&#39;s <a class="link" href="https://linkedin.com/in/francoisp?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">François Proulx</a> emphasizes the collaborative nature of the folks working to detect and respond to these supply chain attacks. More from <a class="link" href="https://semgrep.dev/blog/2026/the-teampcp-credential-infostealer-chain-attack-reaches-pythons-litellm/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Semgrep</a> and <a class="link" href="https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Datadog</a>.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/HackingLZ/litellm_1.82.8_payload?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">HackingLZ/litellm_1.82.8_payload</a> - Defanged malware stages from the litellm 1.82.8 PyPI supply chain compromise — credential stealer, K8s lateral movement, C2 backdoor.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://jfrog.com/blog/agent-skills-new-ai-packages?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Agent Skills are the New Packages of AI: It&#39;s Time to Manage Them Securely</a><br>JFrog’s <a class="link" href="https://www.linkedin.com/in/yonatan-arbel/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Yonatan Arbel</a> announces their Agent Skills Registry product. Yonatan argues that we should be treating Skills like open source dependencies: version tracking them, scanning them for malicious contents, tracking provenance, etc.</p><p class="paragraph" style="text-align:left;">💡Something like this makes a lot of sense to me. We should be taking all of the lessons we’ve learned over time from various package registries and language ecosystems and ideally building them in from the beginning with new things like Skills.</p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/mandiant/speakeasy?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">mandiant/speakeasy</a><br>By <a class="link" href="https://linkedin.com/company/mandiant?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Mandiant</a>: A Windows malware emulation framework that executes binaries, drivers, and shellcode in a modeled Windows runtime instead of a full VM. It emulates APIs, process/thread behavior, filesystem, registry, and network activity so samples can keep moving through realistic execution paths.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://ctrlaltintel.com/threat%20research/FancyBear?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</a><br>Ctrl-Alt-Intel discovered an exposed open-directory on a FancyBear (APT28/GRU) C2 server that revealed the group&#39;s complete toolkit, telemetry logs, and exfiltrated data from a 500+ day espionage campaign targeting government and military entities across Ukraine, Romania, Bulgaria, Greece, Serbia, and North Macedonia. The exposed server contained 2,800+ exfiltrated emails, 240+ credential sets with TOTP 2FA secrets, and more. </p><p class="paragraph" style="text-align:left;">“FancyBear developed a modular, multi-platform exploitation toolkit where a victim simply opening a malicious email - with no further clicks - could result in their credentials stolen, their 2FA bypassed, emails within their mailbox exfiltrated, and a silent forwarding rule established that persists indefinitely.”</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://rastamouse.me/islands-of-invariance?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Islands of Invariance</a><br>Rasta Mouse (maybe <a class="link" href="https://x.com/_RastaMouse?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Rasta Mouse</a> on X, <a class="link" href="https://www.linkedin.com/in/daniel-rastamouse-duggan/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Daniel Duggan</a>?) describes how Crystal Palace now includes an automatic YARA generator that creates signatures based on &quot;islands of invariance&quot; (predictable, unchanged code patterns after optimization).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://aff-wg.org/2026/03/03/a-scalpel-a-hammer-and-a-foot-gun?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">A scalpel, a hammer, and a foot gun</a><br><a class="link" href="https://linkedin.com/in/rsmudge?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Raphael Mudge</a> has released ised, a program rewriting tool for Crystal Palace that surgically inserts or replaces code at instruction pattern matches to break content signatures. The tool uses a two-pass implementation with prepend/append/replace buckets and supports specific/generic/mnemonic pattern matching from Crystal Palace&#39;s disassembler output.</p><p class="paragraph" style="text-align:left;">&quot;A potential outcome is that researchers building tools on this platform may feel quite comfortable releasing Yara rules for all of their capability. It’s no loss, because they and their users would likely have a private ised-cocktail ready to go. What would change in red teaming (or cybersecurity even), if there was no fear of ‘burning a tool’ because of its content tells and behavior was the only meaningful battleground?&quot;</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/ghostvectoracademy/DLLHijackHunter?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">ghostvectoracademy/DLLHijackHunter</a><br>By <a class="link" href="https://www.linkedin.com/company/ghostvector-academy/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">GhostVector Academy</a>: An automated Windows DLL hijacking detection tool that discovers, validates, and confirms exploitable DLL hijack opportunities through a four-phase pipeline: discovery (enumerates binaries across services, scheduled tasks, startup items, COM objects, and AutoElevate UAC bypass vectors), filtration (eliminates false positives through hard and soft gates), canary confirmation (deploys a harmless canary DLL and triggers the binary to prove the hijack works), and scoring (0-100% confidence plus 0-10 impact score based on privilege gained, trigger reliability, and stealth). </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/NVIDIA/NemoClaw?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">NVIDIA/NemoClaw</a><br>An open source referencer stack that simplifies running OpenClaw agents inside NVIDIA OpenShell sandboxes with multi-layer security controls including Landlock, seccomp, network namespaces, and policy-enforced egress filtering. More below.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/NVIDIA/OpenShell?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">NVIDIA/OpenShell</a><br>OpenShell provides a sandboxed execution environment for AI agents that enforces declarative YAML policies to prevent unauthorized file access, data exfiltration, and uncontrolled network activity. The system runs as a K3s cluster inside a single Docker container and applies defense-in-depth across four policy domains: filesystem (read/write restrictions), network (outbound connection control with HTTP method and path-level enforcement), process (privilege escalation blocking), and inference (model API call routing). </p><p class="paragraph" style="text-align:left;">OpenShell supports Claude, OpenCode, Codex, OpenClaw, and Ollama agents out of the box and manages credentials as injectable providers that never touch the sandbox filesystem. Security policies are hot-reloadable at runtime for network and inference layers, while filesystem and process restrictions are locked at sandbox creation</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.provos.org/p/ironcurtain-secure-personal-assistant?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">IronCurtain: A Personal AI Assistant Built Secure from the Ground Up</a><br>Security legend <a class="link" href="https://www.linkedin.com/in/nielsprovos/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Niels Provos</a> asked himself: How would you build a personal AI assistant if you took security seriously from the start? So he built <a class="link" href="https://github.com/provos/ironcurtain?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">IronCurtain</a>, which sandboxes LLM-generated code, enforces policy in plain English, and keeps credentials out of the agent&#39;s reach.</p><p class="paragraph" style="text-align:left;">IronCurtain funnels all actions through a single MCP proxy chokepoint where a policy engine enforces rules written in plain English and compiled to deterministic policies. The system supports two sandbox modes: Code Mode runs LLM-generated TypeScript in isolated V8 with no filesystem/network access, while Docker Mode runs full agents like Claude Code CLI in containers with <code>--network=none</code> where a MITM proxy swaps fake API keys for real ones to maintain credential separation. </p><p class="paragraph" style="text-align:left;">The plain-English constitution approach (inspired by Microsoft Research&#39;s LEGALEASE) lets users write policies like &quot;agent may read/write files in project directory but must ask before git push&quot; which compile to deterministic allow/deny/escalate rules, with an optional auto-approver that recognizes explicit user intent to reduce alert fatigue.</p><p class="paragraph" style="text-align:left;">💡 Really thoughtful, great read. I love the architecture of making sure there’s a single security enforcement point, and how you can ease the burden of writing complex enforcement policies via natural language (but that are still enforced deterministically).</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Feels</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/thomassowell/status/1996709851263914124?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Hugh Grant</a>: &quot;It&#39;s been very, very depressing watching Big Tech kidnap their lives, and to see children really finding it very, very difficult to get properly interested in anything that isn&#39;t a screen.&quot;</p></li><li><p class="paragraph" style="text-align:left;">Matthew Hussey - <a class="link" href="https://www.youtube.com/watch?v=x3cr76JP820&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Why Men Don&#39;t Open Up These Days...</a></p></li><li><p class="paragraph" style="text-align:left;">HealthyGamerGG - <a class="link" href="https://www.youtube.com/watch?v=2unELGOein8&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Why Sharing Your Feelings Can Kill Your Relationship</a> </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=GEzd61aRhl4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Kevin James on Finding Love Later in Life</a></p></li><li><p class="paragraph" style="text-align:left;">Ethan Hawke - <a class="link" href="https://www.youtube.com/shorts/hBt3cWvB6pQ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">The one who’s in love always wins</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.worksinprogress.news/p/many-of-the-tastiest-vegetables-are?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">How an unappetizing shrub became dozens of different vegetables</a> - Centuries of selective breeding turned a single wild weed into everything from broccoli to Brussels sprouts. Whoa 🤯 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.polygon.com/pokemon-go-data-ai-robots-niantic?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Turns out all your Pokémon Go data will be used to train robots</a> - Niantic is using location data collected from Pokémon Go and Ingress players to train Coco Robotics&#39; urban delivery robots.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/rexrodeo/american-healthcare-conundrum?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">rexrodeo/american-healthcare-conundrum</a> - Investigative data journalism: quantifying fixable waste in US healthcare, one issue at a time. Open-source analysis of CMS, OECD, and federal datasets. $98.6B in savings identified so far.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehill.com/policy/defense/5784917-zelesnky-russia-iran-drone-claims?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">Zelensky: Russia providing Iran with Shahed drones used against US bases</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.carryology.com/insights/how-the-turner-twins-are-mythbusting-modern-gear/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">How the Turner Twins Are Mythbusting Modern Gear</a> - The twins are A/B testing modern gear by having one dress in cutting-edge technical apparel and the other in 100-year-old heritage kit on the world’s toughest expeditions.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://statmodeling.stat.columbia.edu/2026/03/24/false-claims-in-a-published-no-corrections-no-consequences-welcome-to-the-business-school/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">False claims in a widely-cited paper. No corrections. No consequences. Welcome to the Business School.</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=nPDH4lZB6HU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">&quot;One Day More,&quot; except Waluigi is every part</a> 😂 😂 </p></li><li><p class="paragraph" style="text-align:left;">America’s Got Talent - <a class="link" href="https://www.youtube.com/shorts/m75lgPRY4ZQ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">A magician instantly changing her outfit like 8 times</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-321-sandboxing-ai-agents-trivy-compromised-pentesting-aws-ai-pentester" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=267560d7-a538-4919-8cc1-17ebf9a87016&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #320 - Ramp&#39;s Security Agents, How Datadog Caught Malicious OSS Contributions, Obliterating Model Refusals</title>
  <description>How Ramp fixed ~100 security issues in 6 days, detecting and mitigating GitHub supply chain attacks, two tools to automatically remove censorship from models</description>
  <link>https://tldrsec.com/p/tldr-sec-320</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-320</guid>
  <pubDate>Thu, 19 Mar 2026 14:30:00 +0000</pubDate>
  <atom:published>2026-03-19T14:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">👩‍💻 Brace Yourself, Conferences Cometh</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">I’m excited for BSidesSF and RSA but phew, things have been busy 😅</p><p class="paragraph" style="text-align:left;">If you’re flying in to San Francisco, safe travels! And remember to periodically eat, sleep, and shower amidst all the fun conference and event activities.</p><ul><li><p class="paragraph" style="text-align:left;"><b>Friday</b> - <a class="link" href="https://luma.com/ljd8kxzr?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">tl;dr sec Community Kickoff</a>. </p><ul><li><p class="paragraph" style="text-align:left;">Mostly filling up, but DM me and I’ll try get you in.</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Saturday</b> - I’m joining my friends on an <a class="link" href="https://bsidessf2026.sched.com/event/2E1eG/state-of-absolute-appsec-nulb?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(44, 129, 229)">Absolute AppSec panel</a>, and will be at BSidesSF both days!</p></li><li><p class="paragraph" style="text-align:left;"><b>Wednesday</b> - <a class="link" href="https://luma.com/um3t4mve?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Coding Agents Unleashed hosted by TL;DR Sec & Unsupervised Learning</a> - There’s going to be some 🔥 lightning talks from smart folks. Broader Decibel registration link <a class="link" href="https://luma.com/7pw1xhoe?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p></li></ul><p class="paragraph" style="text-align:left;">Semgrep is also having a <a class="link" href="https://semgrep.dev/events/rsa?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">ton of events</a>. If you need a break from the RSA craziness you can <a class="link" href="https://semgrep.dev/events/rsa-builders-lounge/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">stop by the office</a>, get some coffee, snacks, or lunch, and chat with some Semgrep folks if you want. </p><p class="paragraph" style="text-align:left;">If you find me I’ll have some <i>tl;dr sec</i> t-shirts and brand new stickers…</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/954d770a-66f8-4587-87d6-b2ac20bcecb8/Screenshot_2026-03-18_at_11.18.27_PM.png?t=1773901118"/><div class="image__source"><span class="image__source_text"><p>Hard to tell from the photo but it’s holographic</p></span></div></div><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h2 class="heading" style="text-align:center;">📣 <b>Cybercrime Just Hit Escape Velocity </b><br><b>(Here’s the Evidence)</b></h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Flashpoint just released its 2026 Global Threat Intelligence Report, and the data is shocking.</p><ul><li><p class="paragraph" style="text-align:left;">AI-related illicit activity surged <b>1,500%</b> in a single month</p></li><li><p class="paragraph" style="text-align:left;"><b>3.3B</b> compromised credentials are now fueling identity-based attacks</p></li><li><p class="paragraph" style="text-align:left;">Ransomware incidents increased <b>53%</b> as groups pivot toward pure-play extortion</p></li></ul><p class="paragraph" style="text-align:left;">The report also explores how threat actors are moving from generative tools to agentic AI frameworks that can automate attacks at scale.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://go.flashpoint-intel.com/2026-global-threat-intelligence-report?utm_source=tldrinfosec&utm_medium=newsletter&utm_campaign=Resource_RP_GTI_2026&sfcampaign_id=701Rc00000dDaIXIA0" target="_blank" rel="noopener noreferrer nofollow"><b>View the Report</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">AI is definitely helping threat actors in a number of ways, I’m curious to see more 👀 Agent-led end-to-end attacks and automated exploitation sounds very interesting.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.doyensec.com/2024/09/19/phishing-case-study.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Applying Security Engineering to Make Phishing Harder</a> - Lessons learned by Doyensec from testing a “Communication Platform as a Service.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://corridor.dev/?utm_source=tldrsec&utm_medium=email&utm_campaign=seriesa_announcement" target="_blank" rel="noopener noreferrer nofollow">Corridor Raises $25M Series A to Secure AI Coding at the Source</a> - Corridor is tackling a problem many Security and Engineering Teams are starting to feel big time - code being generated faster than traditional AppSec can secure it. Corridor’s approach embeds security directly into AI coding workflows. Backed by some of the smartest investors in AI and AppSec. tl;dr sec readers get 3 months free!*</p><ul><li><p class="paragraph" style="text-align:left;">Corridor has been able to pull some security OGs, like Alex Stamos and Joel Wallenstrom. I’m excited to see what they’re building 🤘 </p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/martino-spagnuolo/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Martino Spagnuolo</a> - <a class="link" href="https://r3verii.github.io/cve/2026/02/27/nodejs-toctou.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting</a></p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://bishopfox.com/blog/swagger-jacker-auditing-openapi-definition-files?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Introducing Swagger Jacker: Auditing OpenAPI Definition Files</a><br>Bishop Fox’s <a class="link" href="https://www.linkedin.com/in/tony-west-lv/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Tony West</a> announces Swagger Jacker, a command line tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files. It parses the definition file for paths, parameters, and accepted methods and passes the results to one of five subcommands: <code>automate</code> (sends requests and analyzes response status codes), <code>prepare</code> (generates curl/sqlmap command templates for manual testing), <code>endpoints</code> (lists raw API routes), <code>brute</code> (discovers hidden definition files using 2173+ common paths), and <code>convert</code> (converts v2 to v3 definitions).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://synacktiv.com/en/publications/mitmproxy-for-fun-and-profit-interception-and-analysis-of-application-traffic?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">mitmproxy for fun and profit: Interception and Analysis of Application</a><br>Guide by Synacktiv&#39;s <a class="link" href="https://www.linkedin.com/in/corentin-liaud/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Corentin Liaud</a> on using mitmproxy for network traffic interception across Linux, Android, and iOS, including three examples: redirecting git clone requests to download a different repository by modifying HTTP paths, spoofing Android geolocation by parsing and altering gRPC/protobuf coordinates sent to Google&#39;s geomobileservices API, and passively capturing Mumble VoIP chat messages by running mitmproxy in reverse TLS mode with custom protobuf parsing scripts. </p><p class="paragraph" style="text-align:left;">The post describes setting up your test environment (using Linux network namespaces, lnxrouter for WiFi AP creation, and nftables for transparent traffic redirection), using Magisk&#39;s Cert-Fixer module to install system certificates on Android, and includes Python scripts showing how to parse and modify protocol buffers in transit.</p><p class="paragraph" style="text-align:left;"></p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> Your SOC is a queueing system. </b><br><b>The math matters more than you think.</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">If you&#39;ve ever looked at utilization curves, you know what happens when a queue runs hot: wait time doesn&#39;t scale linearly. It spikes. In a SOC, that means alerts aging out before anyone touches them.</p><p class="paragraph" style="text-align:left;">&quot;The Queue is the Breach&quot; ebook from Prophet Security applies operational math to SOC performance: alert cycle time, wait time by severity, and what analyst utilization actually implies about your team&#39;s capacity. It&#39;s a framework for diagnosing whether your bottleneck is people, tooling, or the operating model.</p><p class="paragraph" style="text-align:left;">Written by Jon Hencinski, Head of Security Operations at Prophet.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://resources.prophetsecurity.ai/ebook-the-queue-is-the-breach?lsource=tldr-sec&utm_source=tldrsec&utm_medium=paid-newsletter&utm_campaign=tldrsec_secondarysponsorship_03-19-2026" target="_blank" rel="noopener noreferrer nofollow"><b>Download the eBook </b></a><b>👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Nice, I like when people take a data-driven approach to security 👍️ </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/twenty-years-of-cloud-security-research?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Twenty Years of Cloud Security Research</a><br>Cloud historian, scholar, and man of the people <a class="link" href="https://linkedin.com/in/scott-piper-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Scott Piper</a> traces 20 years of cloud security evolution through three distinct eras: the Foundational era (2006-2016) when AWS built core security features like IAM (2011), CloudTrail (2013), and Organizations (2016); the CSPM era (2016-2021) marked by open-source tools like Scout2, Cloud Custodian, Prowler, CloudMapper, Pacu, and StreamAlert; and the CNAPP era (2021-2025) with new cloud security vendors and researchers discovering cross-tenant vulnerabilities like chaosdb and omigod. The emerging AI era (2025+) is fundamentally changing both offense and defense, with AI creating exploits for CVE-2025-32433 and mongobleed in minutes, winning HackerOne&#39;s top bounty spot, and solving CTF challenges instantly.</p><p class="paragraph" style="text-align:left;">💡 Great overview of relevant research and tools, and nice perspective on how cloud security has been evolving over time.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://onecloudplease.com/blog/bucketsquatting-is-finally-dead?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Bucketsquatting is (Finally) Dead</a><br><a class="link" href="https://linkedin.com/in/iann0036?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Ian McKay</a> describes AWS&#39;s new S3 bucket namespace protection that prevents bucketsquatting attacks by requiring buckets to follow the format <code>&lt;prefix&gt;-&lt;accountid&gt;-&lt;region&gt;-an</code>, ensuring only the owning account can create buckets matching that pattern. AWS recommends this namespace be used by default for all new buckets and provides a new condition key <code>s3:x-amz-bucket-namespace</code> that security administrators can enforce via SCP policies across their organization.</p><p class="paragraph" style="text-align:left;">Google Cloud Storage addresses this differently through domain name verification for bucket names, while Azure Blob Storage remains vulnerable due to its configurable account/container name structure and 24-character limit on storage account names.</p><p class="paragraph" style="text-align:left;">See <a class="link" href="https://hackaws.cloud/blog/aws-finally-gave-s3-buckets-their-own-rooms?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">AWS Finally Gave S3 Buckets Their Own Rooms</a> for more context on the issue and an overview of relevant prior research by Aqua.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.praetorian.com/blog/building-bridges-breaking-pipelines-introducing-trajan?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Building Bridges, Breaking Pipelines: Introducing Trajan</a><br>Praetorian&#39;s <a class="link" href="https://www.linkedin.com/in/aj-hammond?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">AJ Hammond</a>, <a class="link" href="https://www.linkedin.com/in/carter-a-ross?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Carter Ross</a>, <a class="link" href="https://www.linkedin.com/in/evanleleux/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Evan Leleux</a> et al announce <a class="link" href="https://github.com/praetorian-inc/trajan?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Trajan</a>, an open-source CI/CD security tool from Praetorian that unifies vulnerability detection and attack validation across GitHub Actions, GitLab CI, Azure DevOps, and Jenkins in a single cross-platform engine. It ships with 32 detection plugins and 24 attack plugins covering poisoned pipeline execution, secrets exposure, self-hosted runner risks, and AI/LLM pipeline vulnerabilities.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.datadoghq.com/blog/engineering/stopping-hackerbot-claw-with-bewaire?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">When an AI agent came knocking: Catching malicious contributions in Datadog’s open source repos</a><br>Datadog’s <a class="link" href="https://linkedin.com/in/hamsen?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Christoph Hamsen</a>, <a class="link" href="https://linkedin.com/in/christophetafanidereeper?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Christophe Tafani-Dereeper</a>, and <a class="link" href="https://www.linkedin.com/in/kylian-serrania-059021138/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Kylian Serrania</a> describe how their LLM-powered code review system <a class="link" href="https://www.datadoghq.com/blog/engineering/malicious-pull-requests/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals#using-llms-to-detect-maliciousness-at-scale" target="_blank" rel="noopener noreferrer nofollow">BewAIre</a> detected and helped mitigate attacks from hackerbot-claw, an AI agent that attempted to exploit GitHub Actions workflows across their open source repositories. The attacker successfully achieved code execution in one workflow via command injection in filenames, but defense-in-depth controls (organization-wide GitHub rulesets preventing direct pushes to main branches, restricted GITHUB_TOKEN permissions, and no sensitive secrets exposure) limited impact to only pushing a harmless commit to a non-protected branch.</p><p class="paragraph" style="text-align:left;">💡 Nice walk through of noticing your open source repos are being targeted → investigating potential impact, and solid advice on hardening open source repos/GitHub Actions. Also, I really like the bullets towards the top on Datadog’s SDLC Security team initiatives re: adapting octo-sts, removing GitHub Action secrets at scale, enforcing CI security best practices, and building golden paths.</p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/elastic/agent-skills?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">elastic/agent-skills</a><br>Elastic’s official Skills repos, covering cloud, Elasticsearch, Kibana, observability, and security. Currently includes 4 security Skills for: triaging alerts, case management (managing SOC cases via Kibana Cases when tracking incidents), detection rule management (create, tune, and manage Elastic Security detection rules), and generating sample security data (security events, attack scenarios, and synthetic alerts).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@terminalsandcoffee/building-a-cloud-native-detection-engineering-lab-with-terraform-and-aws-63d3990190f1?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Building a Cloud-Native Detection Engineering Lab with Terraform and AWS</a><br><a class="link" href="https://www.linkedin.com/in/rgmartinez-cloud/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Rafael Martinez</a> describes building a fully automated detection engineering lab (<a class="link" href="https://github.com/TerminalsandCoffee/detection-engineering?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>) in AWS using Terraform to overcome local hardware limitations, deploying three EC2 instances: Kali Linux (attacker), Windows Server with Sysmon and Winlogbeat (target), and Ubuntu running Elasticsearch and Kibana (SIEM). Easy to spin up and down as needed.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://mostafa.dev/pattern-detection-and-correlation-in-json-logs-fab16334e4ee?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Pattern Detection and Correlation in JSON Logs</a><br><a class="link" href="https://linkedin.com/in/mostafa-moradian?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Mostafa Moradian</a> announces <a class="link" href="https://github.com/timescale/rsigma?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">RSigma</a>, a Rust-based command-line tool that evaluates Sigma detection rules against JSON logs without requiring a SIEM. “Think of RSigma as <code>jq</code> for threat detection: you point it at a set of <a class="link" href="https://github.com/SigmaHQ/sigma?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Sigma</a> detection rules and a stream of JSON events, and it tells you what matched, with no ingestion pipeline, no database, no infrastructure.”</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">RSigma parses YAML rules into a strongly-typed AST, compiles them into optimized matchers, and evaluates them directly against JSON log events in real-time. The toolkit includes rsigma-parser for parsing, rsigma-eval for compilation and evaluation with stateful correlation logic and compressed event storage, a CLI for parsing, validating, linting, and evaluating rules, and rsigma-lsp for IDE support.</p></div><p class="paragraph" style="text-align:left;">💡 Accurately evaluating the full spectrum of what Sigma rules can express is quite complex, it’s pretty neat to read about how RSigma handles all of these conditional expressions, correlating across rules, etc. </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/nikaiw/VMkatz?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">nikaiw/VMkatz</a><br>Extract Windows credentials directly from VM memory snapshots and virtual disks. A single static 2.5MB binary that can extract NTLM hashes, DPAPI master keys, Kerberos tickets, cached domain credentials, LSA secrets, NTDS.dit, directly from VM memory snapshots and virtual disks, no need to exfiltrate a massive VM file.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://slcyber.io/research-center/hyoketsu-solving-the-vendor-dependency-problem-in-re?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Solving the Vendor Dependency Problem in RE</a><br>Many enterprise applications ship with hundreds to thousands of vendor dependencies, which makes it annoying to locate and analyze the proprietary source code of the application. You drown in vendor code, not the exposed attack surface. Assetnote’s <a class="link" href="https://www.linkedin.com/in/patrikfehrenbach/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Patrik Grobshäuser</a> announces the release of <a class="link" href="https://github.com/assetnote/hyoketsu?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Hyoketsu</a>, an open-source tool that automatically filters vendor dependencies from Java JARs and .NET DLLs during reverse engineering by using Microsoft runtime detection (via PE header public key tokens), hash matching, and filename matching against a 13.3 GB pre-built SQLite database containing 12M+ DLLs and 14M+ JARs.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/p-e-w/heretic?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">p-e-w/heretic</a><br>By Philipp Emanuel Weidmann: Fully automatic censorship removal for language models. Heretic removes censorship (aka &quot;safety alignment&quot;) from transformer-based language models without expensive post-training by combining an advanced implementation of directional ablation, also known as &quot;abliteration.” This approach creates a decensored model that retains as much of the original model&#39;s intelligence as possible.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/elder-plinius/OBLITERATUS?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">elder-plinius/OBLITERATUS</a><br>By <a class="link" href="https://x.com/elder_plinius?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Pliny the Liberator</a>: An open-source toolkit for removing refusal behaviors from LLMs via abliteration (surgically identifying and projecting out internal refusal representations without retraining). Every obliteration run with telemetry enabled contributes anonymous benchmark data to a crowd-sourced research dataset measuring refusal direction universality across 116+ models and 5 compute tiers</p><p class="paragraph" style="text-align:left;">Blog overview: <a class="link" href="https://awesomeagents.ai/news/obliteratus-strips-ai-safety-open-models?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">OBLITERATUS Strips AI Safety From Open Models in Minutes</a>, and pretty detailed Hugging Face guest post by Maxime Labonne on <a class="link" href="https://huggingface.co/blog/mlabonne/abliteration?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">abliteration here</a>, including code on Google Colab and in an LLM course on GitHub.</p><p class="paragraph" style="text-align:left;">💡 As open source models become better and better, not sure how I feel about removing “don’t cause harm” alignment training 😅 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://openai.com/index/why-codex-security-doesnt-include-sast?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Why Codex Security Doesn’t Include a SAST Report</a><br>OpenAI describes why Codex Security doesn’t start by triaging SAST results, but instead starts with understanding the repository’s architecture and trust boundaries: they don’t want to overly influence where Codex looks, not all bugs are dataflow problems, and sometimes code appears to enforce a security check, but it doesn’t actually guarantee the property the system relies on.</p><p class="paragraph" style="text-align:left;">When Codex Security encounters a boundary that looks like “validation” or “sanitization,” it tries to bypass it:</p><ul><li><p class="paragraph" style="text-align:left;">Reading the relevant code path with full repository context, looking for mismatches between intent and implementation.</p></li><li><p class="paragraph" style="text-align:left;">Pulling out security-relevant code slices and writing micro-fuzzers for them.</p></li><li><p class="paragraph" style="text-align:left;">They give the model access to a Python environment with z3-solver for solving complicated input constraint problems.</p></li><li><p class="paragraph" style="text-align:left;">Executing hypotheses in a sandboxed validation environment to prove exploitability.</p></li></ul><p class="paragraph" style="text-align:left;">💡 The post is overall a good discussion of the space and outlines challenges for security scanners. I especially liked though the “how Codex validates” section, because it starts getting into some of Codex Security’s unique technical details.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cursor.com/blog/security-agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Securing our codebase with autonomous agents</a><br><a class="link" href="https://linkedin.com/in/travismcpeak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Travis McPeak</a> describes how Cursor built four security automation templates using Cursor Automations and a custom security MCP tool to handle securing their code at scale, as Cursor’s PR velocity has increased 5x in the past 9 months. The automations include: <b>Agentic Security Review</b> (blocks PRs with security issues), <b>Vuln Hunter</b> (scans existing code for vulnerabilities), <b>Anybump</b> (automatically patches dependencies using reachability analysis and opens PRs after tests pass), and <b>Invariant Sentinel</b> (monitors daily for drift against security/compliance properties). You can see their prompts on their marketplace pages.</p><p class="paragraph" style="text-align:left;">Their <a class="link" href="https://github.com/mcpeak/cursor-security-automation?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">security MCP</a>, deployed as a serverless Lambda function, provides persistent data storage, deduplication of LLM-generated findings using Gemini Flash 2.5, and consistent Slack reporting across all agents. In the last two months, Agentic Security Review alone has run on thousands of PRs and prevented hundreds of security issues from reaching production.</p><p class="paragraph" style="text-align:left;">💡 I like the focus on <b>useful</b> <b>primitives</b> that empower you to build security tooling on top of: “For agents to be useful for security, they need: out-of-the-box integrations for receiving webhooks, responding to GitHub pull requests, and monitoring codebase changes, and a rich agent harness and environment (<a class="link" href="https://cursor.com/docs/cloud-agent?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">cloud agents</a> give them all the tools, skills, and observability that cloud agents have access to).</p><p class="paragraph" style="text-align:left;">I also wanted to call out the Invariant Sentinel, that’s very clever: what security properties about this repo should always be true? Did this most recent change violate that? I bet detecting drift like this catches some meaningful bugs.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://builders.ramp.com/post/100-vulnerabilities-patched-with-0-humans?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">We proactively fixed ~100 security issues in 6 days with 0 humans</a><br><a class="link" href="https://www.linkedin.com/in/eli-block/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Eli Block</a> describes how Ramp Security Engineering built a custom agent pipeline that autonomously found, validated, and fixed ~100 novel security issues in 6 days. Their pipeline starts off with a <i>coordinator</i> agent equipped with skills for each vulnerability category (e.g. IDOR, XSS, …), which launches <i>detector</i> agents in parallel, whose findings are then passed to an adversarial <i>manager</i> agent who checks for false positives (~40% false positive reduction in their sample set of testing).</p><p class="paragraph" style="text-align:left;">They found it was difficult to reproduce vulnerabilities with complex pre-conditions against a live Ramp deployment, so instead their validator agent takes reported findings and writes an integration test that reproduced the vulnerability that passes only if the endpoint was secure. Then the <i>fixer</i> agent can patch the vulnerability by following test-driven development on the previously written integration test.</p><p class="paragraph" style="text-align:left;">💡 Great write-up! Overall this agent pipeline follows a pretty standard structure (per bug class detectors → vet findings → try to reproduce / “prove” the issue → generate fix), but a few things stand out as unique and valuable insights:</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Detectors include real examples of that vulnerability <i>from Ramp’s code base</i>. I bet this allows the detectors to be much more precise and effective.</p></li><li><p class="paragraph" style="text-align:left;">Rather than trying to reproduce vulnerabilities in a live environment, they write integration tests that demonstrate the bug. As there are probably already test fixtures or other examples in the code the agent can borrow from, it makes sense that this method would often work in practice. This approach also has the added benefit that you now have a regression test for this bug coming back in the future. </p><ol start="1"><li><p class="paragraph" style="text-align:left;">So this leans into what models are good at (writing code) and future proofs the bug from coming back 👍️ </p></li><li><p class="paragraph" style="text-align:left;">I’ve been thinking about this approach for a bit now so it’s gratifying to see someone do it 🙂 </p></li></ol></li></ol><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Tech</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/vercel-labs/portless?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">vercel-labs/portless</a> - Replace port numbers with stable, named <code>.localhost</code> URLs for local development. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/peakoss/anti-slop?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">peakoss/anti-slop</a> - A GitHub action that detects and automatically closes low-quality and AI slop PRs.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/C9coc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Meta created ‘playbook’ to fend off pressure to crack down on scammers, documents show</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.resistandunsubscribe.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Resist and Unsubscribe</a> - Scott Galloway’s initiative to influence politics by voting with your wallet.</p></li><li><p class="paragraph" style="text-align:left;">Andrej Karpathy - <a class="link" href="https://karpathy.ai/jobs/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">US Job Market Visualizer</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.dwarkesh.com/p/dow-anthropic?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">The most important question nobody&#39;s asking about AI</a> - Why Dwarkesh Patel is happy the Anthropic fight is happening now.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.thestack.technology/mckinsey-ai-agent-hacked-lilli/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Startup&#39;s agent hacked McKinsey AI - exposing huge volumes of sensitive data</a> - $20 in tokens and two hours to expose 46 million chat logs, 728,000 private files and proprietary RAG documentation. <a class="link" href="https://news.ycombinator.com/item?id=47333627&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">HN discussion</a>.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.forbes.com/sites/the-wiretap/2026/03/10/undercover-cops-ai-teenager-catches-pedophile?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Undercover Cop Generated An AI Teenager To Catch Pedophiles</a> - Apparently AI has “been a boon for child abuse investigators,” as when asked for selfies they don’t need to use real images.</p><ul><li><p class="paragraph" style="text-align:left;">Related: In 2018, Microsoft volunteers worked with nonprofit Street Grace to create an AI chatbot that interacts with people who click on decoy advertisements on trafficking sites.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/4b3rHqWOg2I?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Ed Sheeran on Friends Keep Secrets</a> - Quickly creating a song from scratch with Benny Blanco. Wow, super cool 😍 </p></li><li><p class="paragraph" style="text-align:left;">Kai Lentit - <a class="link" href="https://www.youtube.com/watch?v=xE9W9Ghe4Jk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Shipping a button in 2026…</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/8zMowckwKK4?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">This infinite drawing canvas is insane</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Politics</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/u40U4?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Foreign hacker in 2023 compromised Epstein files FBI held</a> - “The hacker expressed disgust at the presence of child abuse images on the device and left a message threatening to turn its owner over to the FBI. Bureau officials defused the situation by convincing the hacker that they actually were the FBI.” 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/MeUCc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Putin can’t survive without war</a> - The article argues that Russia&#39;s war in Ukraine has transformed the country into a &quot;necropolis&quot; where death has become central to its economy, culture, and social fabric. The war sustains a &quot;deathonomics&quot; model where provincial economies depend on recruitment bonuses and death payments (sometimes reaching $60,000). 40% of state spending now flows to military efforts. Really tough read on the impact on every day Russians :(</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/siIXYtutmW8?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">Trump in November 2011</a>: “Our president (Obama) will start a war with Iran because he has absolutely no ability to negotiate… The only way he figures he’s going to get reelected is to start a war with Iran.”</p></li><li><p class="paragraph" style="text-align:left;">NBC - <a class="link" href="https://www.nbcnews.com/politics/donald-trump/trump-decided-strike-iran-rcna261205?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">How Trump decided to strike Iran</a> - “Before the U.S. and Israel launched their aerial assault, the CIA concluded that if the supreme leader, Ayatollah Ali Khamenei, was killed, he could be replaced by equally hard-line officials from within the regime, according to two people familiar with the matter.”</p><ul><li><p class="paragraph" style="text-align:left;">“Treasury Secretary Scott Bessent told Congress last month that <b>the U.S. had purposely touched off an economic crisis in Iran</b> that led to the massive street protests early this year that jarred the regime. By creating a dollar shortage in Iran, the U.S. forced Iran to print money, sparking inflation and stoking internal enmity toward the leadership, Bessent said.”</p></li><li><p class="paragraph" style="text-align:left;">“…Trump flew to Mar-a-Lago, where he monitored the strike in the company of senior advisers, as he has done for several foreign strikes this term. He also made time Saturday to attend a political fundraising event at his seaside resort.”</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-320-ramp-s-security-agents-how-datadog-caught-malicious-oss-contributions-obliterating-model-refusals" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b3d70b5f-6d1a-4964-aa44-ece2a43289ee&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #319 - AI is Eating Security, BSidesSF &amp; RSA, Claude Finds Firefox 0-days</title>
  <description>What does security look like in 5 years? Let&#39;s hang out in San Francisco and avoid badge scans, Opus 4.6 finds 22 vulns and auto-writes 2 exploits</description>
  <link>https://tldrsec.com/p/tldr-sec-319</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-319</guid>
  <pubDate>Thu, 12 Mar 2026 14:30:00 +0000</pubDate>
  <atom:published>2026-03-12T14:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🌉 BSidesSF and RSA</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">As the gentle blooming of flowers announces spring, and piles of orange leaves welcome fall, so too does the torrential downpour of security vendor emails and LinkedIn DMs “just touching base” herald the arrival of… RSA!</p><p class="paragraph" style="text-align:left;">It’d be great to cross paths if you’re in town. Here’s what I’m up to:</p><p class="paragraph" style="text-align:left;"><b>Pre-BSidesSF</b> - Friday March 20th - <a class="link" href="https://luma.com/ljd8kxzr?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">tl;dr sec Community Kickoff</a>. <i>tl;dr sec</i>’s first community event 😍 I’m excited about it, there’s going to be cool people, I’ve artisanally curated local SF food options, and we’ll have a fireside chat about AI and security builders.</p><p class="paragraph" style="text-align:left;">We’ll also have <i>tl;dr sec</i> t-shirts and a totally new, never before seen sticker…</p><p class="paragraph" style="text-align:left;">If you can’t make it, you can try to get a t-shirt or stickers by a) finding me or b) Semgrep at <a class="link" href="https://semgrep.dev/events/rsa/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">another event</a>.</p><p class="paragraph" style="text-align:left;"><b>BSidesSF</b> - I’m joining my friends on an <a class="link" href="https://bsidessf2026.sched.com/event/2E1eG/state-of-absolute-appsec-nulb?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Absolute AppSec panel</a>, and will generally be around. </p><p class="paragraph" style="text-align:left;">Also check out talks by my colleagues Claudio and Romain on <a class="link" href="https://bsidessf2026.sched.com/event/2E1hn/the-great-sast-dissonance-how-to-please-every-audience-at-scale-nulb?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">scaling SAST rule writing with AI</a>, Katie Paxton-Fear (InsiderPhD) in a <a class="link" href="https://bsidessf2026.sched.com/event/2E1hY/ai-huh-what-is-it-good-for-absolutely-nothin?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">birds of a feather discussion on AI</a>, or Brandon Wu on how to combine AI and static analysis to <a class="link" href="https://bsidessf2026.sched.com/event/2E1hq/one-thousand-and-one-ai-prevented-cves-vibe-coding-a-whole-new-supply-chain-defense?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">process CVEs at scale</a>.</p><p class="paragraph" style="text-align:left;"><b>RSA</b> - I’m organizing a mini con / lightning talks (<a class="link" href="https://www.decibel.vc/rsac-founder-festival?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Unsupervised + Unhinged</a>) with Daniel Miessler and Decibel. Wed March 25 10am - noon. You can register for their overall program <a class="link" href="https://luma.com/7pw1xhoe?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">here</a>. More info coming soon!</p><p class="paragraph" style="text-align:left;">Also, I’ve made it ma, my name is on an announcement graphic alongside The Chainsmokers 😂 😂 </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5800b12d-d4c7-48f4-bccf-19246c788c08/image.png?t=1773296265"/></div><p class="paragraph" style="text-align:left;"> </p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Securing AI Agents 101</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">AI agents are changing how work gets done. They take on tasks, orchestrate tools, and drive outcomes across environments. </p><p class="paragraph" style="text-align:left;">Securing AI Agents 101 is a one-page resource to help teams build a clear understanding of what AI agents are, how they operate, and where key security considerations show up.</p><p class="paragraph" style="text-align:left;">Inside, you’ll find:</p><ul><li><p class="paragraph" style="text-align:left;">What makes an AI agent different from traditional tools</p></li><li><p class="paragraph" style="text-align:left;">Top risks to watch, from shadow AI to excessive permissions</p></li><li><p class="paragraph" style="text-align:left;">Four key questions to assess agent usage and exposure</p></li></ul><p class="paragraph" style="text-align:left;">Download the security flashcard and get up to speed quickly.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.wiz.io/lp/securing-ai-agents-101?utm_source=tldrsec&utm_medium=paid-email&utm_campaign=FY26Q3_INB_FORM_Securing-AI-Agents-101&sfcid=701Py00000RTEWMIA5&utm_term=FY27Q1-tldrsec-nl&utm_content=AI-Agents-101" target="_blank" rel="noopener noreferrer nofollow"><b>Get the Flashcard</b></a><b> </b><b>👈</b></h2></div><p class="paragraph" style="text-align:left;">Things are progressing so fast in this space, great to have a one pager to quickly get up to speed 👍️ </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/1Password/load-secrets-action?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">1Password/load-secrets-action</a><br>Load secrets from 1Password into your GitHub Actions jobs using <a class="link" href="https://developer.1password.com/docs/service-accounts?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Service Accounts</a> or <a class="link" href="https://developer.1password.com/docs/connect?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">1Password Connect</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.timcappalli.me/p/passkeys-prf-warning?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Please, please, please stop using passkeys for encrypting user data</a><br><a class="link" href="https://www.linkedin.com/in/timcappalli/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Tim Cappalli</a> warns companies against using WebAuthn&#39;s PRF (Pseudo-Random Function) extension to derive encryption keys for user data, because it couples authentication credentials with data encryption in ways users don&#39;t understand. When users delete a passkey from credential managers like Apple Passwords, Google Password Manager, or Bitwarden, they receive no warning that they&#39;re permanently destroying access to encrypted photos, message backups, documents, crypto wallets, or other critical data.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.uber.com/blog/superuser-gateway-guardrails/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Superuser Gateway: Guardrails for Privileged Command Execution</a><br>Uber’s <a class="link" href="https://www.linkedin.com/in/psuben/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Pavi Subenderan</a> and <a class="link" href="https://www.linkedin.com/in/jyoti-grewal/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Jyoti Grewal</a> describe Superuser Gateway, a system built to replace direct superuser CLI access with a peer-reviewed, auditable workflow for dangerous operations on production systems (e.g. Google Cloud Storage, OCI, and HDFS). Engineers now submit commands via superuser-cli, which generates a PR in a Git repository where automated CI jobs perform syntax validation, permission checks, and impact estimation (like calculating files affected by <code>rm -r</code>), before a peer approves and a backend service executes the command remotely. This architecture removes superuser credentials from individual engineers&#39; machines entirely, ensuring all privileged operations flow through mandatory peer review while maintaining operational velocity for on-call scenarios.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">🚨<b> </b><b>Most Confident Organizations Have 2x Higher AI Incident Rates </b>🚨</h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Counterintuitive finding from 205 security leaders: organizations most confident in their AI deployments experienced 2x the incident rate of less confident peers. Meanwhile, 43% report AI making infrastructure changes monthly without oversight, and 7% don&#39;t even track autonomous changes at all.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://goteleport.com/resources/surveys/infrastructure-identity-survey-2026/?utm_campaign=AI&utm_content=webpage&utm_medium=partner&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>See the Confidence Gap Data</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Hm I’m curious about (the lack of) tracking autonomous changes. Also “3 in 5 orgs have had or suspect an AI-related incident.” 🤔 Identity is still key.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://kknowl.es/posts/untangling-microsoft-batch?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Untangling Microsoft Graph&#39;s $batch requests in Burp</a><br>Requests to Microsoft Graph’s <code>$batch</code> endpoint bundle several API calls into one JSON object, which makes analyzing Azure Portal traffic difficult, since underlying API calls for requests to the <code>$batch</code> endpoint are not individually logged. <a class="link" href="https://www.linkedin.com/in/kaknowles/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Katie Knowles</a> has released the <a class="link" href="https://github.com/siigil/burp-extensions/blob/main/graph_batch_parser.py?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">graph_batch_parser.py</a> Burp Suite extension to speed up analysis of <code>$batch</code> requests. The extension processes <code>$batch</code> requests into a set of synthetic request/response pairs that can then be reviewed in the “Graph Batch” tab, as well as Burp’s Site Map.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://aws.plainenglish.io/stop-enabling-every-aws-security-service-fb171635a25c?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Stop Enabling Every AWS Security Service</a><br><a class="link" href="https://linkedin.com/in/sena-yakut?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Sena Yakut</a> argues against enabling every AWS security service at once, advocating instead for a risk-based approach that starts with threat modeling your architecture (what are the risks we need to control for?), understanding team behaviors (who has admin privileges? Are there shared accounts or credentials?), and identifying critical breaking points (where small mistakes can cause major damage) before selecting controls. Avoid service overlap with existing third-party tools (like SIEMs) so you’re not overwhelmed by alerts, and evaluate usage-based pricing- based on your environment, certain managed services might not fit within your budget, but building custom automations with Lambda and EventBridge can fulfill a similar purpose. Use AWS SSO (IAM Identity Center) over individual IAM users.</p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/MatheuZSecurity/ksentinel?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">MatheuZSecurity/ksentinel</a><br>By <a class="link" href="https://linkedin.com/in/matheus-alves-212775208?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">MatheuZ</a>: A Linux kernel module that monitors syscall table integrity and critical kernel functions to detect rootkit modifications like ftrace hooks, kprobes, and syscall table hijacking.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a><br>Google&#39;s Google Threat Intelligence Group (GTIG) discovered the &quot;Coruna&quot; iOS exploit kit containing five full exploit chains and 23 exploits targeting iOS 13.0 through 17.2.1, initially used by a surveillance vendor customer, then by Russian espionage group UNC6353 in watering hole attacks against Ukrainian users, and finally by Chinese financially-motivated actor UNC6691 in broad campaigns.</p><p class="paragraph" style="text-align:left;">Additional technical analysis and IOCs by <a class="link" href="https://linkedin.com/company/iverify-io?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">iVerify</a> in their <a class="link" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">write-up here</a>.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a8eb2a4d-5ce8-4a77-856c-41ed12623be8/image.png?t=1773270637"/></div></div><p class="paragraph" style="text-align:left;">💡 Word on the street is that these exploits may be from the Trenchant guy who sold the iOS exploit chain to a Russian exploit broker, which then proliferated to these other groups.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://detect.fyi/detection-pipeline-maturity-model-076984779651?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Detection Pipeline Maturity Model</a><br><a class="link" href="https://www.linkedin.com/in/scott-plastine-b6767a11/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Scott Plastine</a> presents a five-level maturity model for detection pipelines, progressing from analysts manually checking security consoles (None) to a risk-based correlation engine that aggregates both commercial security tools and custom telemetry analytics (Standard+). The model highlights the differences between closed-source security tool analytics (endpoint tools like CrowdStrike, cloud tools like AWS GuardDuty) and custom analytics built on raw telemetry (Windows Event Logs, AWS CloudTrail), and recommends routing all detections through a risk engine that scores and correlates events across assets and users before alerting. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Advanced maturity adds atomic high-fidelity detections and risk-based custom rules, while Leading maturity incorporates data science-backed outlier detection (using platforms like Databricks or Dataiku) and deception techniques like honeytokens. Scott recommends reducing reliance on unmeasurable closed-source analytics by lowering their risk scores in the correlation engine while building validated custom detections that adversaries can&#39;t test against.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/0xbbuddha/notion?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">0xbbuddha/notion</a><br>A Mythic C2 profile that uses Notion as a covert communication channel. Agents communicate by reading/writing pages in a shared Notion database, making C2 traffic indistinguishable from normal SaaS usage — a Living off Trusted Sites (LoTS) technique.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/vulhunt-re/vulhunt?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">vulhunt-re/vulhunt</a><br><a class="link" href="https://www.linkedin.com/company/binarlyinc/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">BINARLY</a> released VulHunt Community Edition, an open-source vulnerability hunting framework for analyzing software binaries and UEFI firmware, built on their Binary Analysis and Inspection System (BIAS).</p><p class="paragraph" style="text-align:left;">See also their community-contributed <a class="link" href="https://github.com/vulhunt-re/rules?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">rules</a> repo (currently only 3 rules) and <a class="link" href="https://github.com/vulhunt-re/skills?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Skills</a> repo, which contains skills for decompiling functions, finding functions or call sites, performing data flow analysis, searching code/byte patterns, etc. powered by VulHunt MCP tools.</p><p class="paragraph" style="text-align:left;">💡 Also congrats to my friend <a class="link" href="https://www.linkedin.com/in/gwenythcastro?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Gwen Castro</a> who recently became CEO of BINARLY 🥳 </p><p class="paragraph" style="text-align:left;"></p></div><div id="ai-security" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks </b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://rankclaw.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">RankClaw</a> - Web app to scan AI skills for security risks before you install them.</p></li><li><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://hero.permiso.io/securing-ai-agents-in-the-enterprise?utm_source=tldrsec&utm_medium=sponsored&utm_campaign=ai&utm_content=newsletter" target="_blank" rel="noopener noreferrer nofollow">Securing AI Agents in the Enterprise: 5 Use Cases</a></b> - AI agents are now in enterprise environments; running workflows, accessing data, and interacting with other services through roles, tokens, and service accounts. This guide breaks down 5 use cases teams must solve to safely deploy agents across cloud and SaaS environments.* </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://honnibal.dev/blog/clownpocalypse?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">The looming AI clownpocalypse </a>- “What happens when we reach the tipping point where exploits become cheaper to autonomously develop than they yield on average?”</p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.philvenables.com/post/cybersecurity-s-need-for-speed-where-to-find-it?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity’s Need for Speed & Where To Find It</a><br><a class="link" href="https://linkedin.com/in/philvenables?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Phil Venables</a> applies Stewart Brand&#39;s <a class="link" href="https://sketchplanations.substack.com/p/pace-layers?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Pace Layers framework</a> to cybersecurity, arguing that organizations must accelerate their security OODA loops to outpace AI-enabled attackers. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The post covers 11 areas we can speed up, including: </p></div><ul><li><p class="paragraph" style="text-align:left;">Streamline software delivery pipelines - fix faster with coding agents, Skill packs for threat modeling, security analysis, invariant maintenance.</p></li><li><p class="paragraph" style="text-align:left;">Implement autonomic (not just automated) security operations.</p></li><li><p class="paragraph" style="text-align:left;">Systematize threat intelligence into macro (strategic TTPs) and micro (IOCs/signatures) feeds.</p></li><li><p class="paragraph" style="text-align:left;">&quot;Shift down&quot; security controls into lower platform layers for security-by-default.</p></li><li><p class="paragraph" style="text-align:left;">Improve control reliability engineering to catch silent failures.</p></li><li><p class="paragraph" style="text-align:left;">Use deception/moving target defenses to slow attackers while defenders speed up their response cycles.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://drive.google.com/file/d/1hU3Vxm8uyU39lgfjIRfhKoTU6xigKGGy/view?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">AI is Eating Security: What does security look like in five years?</a><br>Great talk by <a class="link" href="https://www.linkedin.com/in/alexstamos/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Alex Stamos</a> at Reddit’s SnooSec last week. I liked his slide on how AI has already impacted security teams across the SOC, security engineering, AppSec, DFIR and threat intel, etc. His high confidence predictions.</p><ul><li><p class="paragraph" style="text-align:left;">Smaller, narrower teams - Fewer, more senior people on top of AI agents.</p></li><li><p class="paragraph" style="text-align:left;">Building on Legos - Companies will build on vendor-provided specialized components.</p></li><li><p class="paragraph" style="text-align:left;">VulnOps - The speed of vuln discovery and exploitation means every company needs to worry about 0-days.</p></li><li><p class="paragraph" style="text-align:left;">Humans will be supervising machine &lt;&gt; machine conflict.</p></li></ul><p class="paragraph" style="text-align:left;">&quot;Five to ten years ago, only ~25 of the Fortune 500 had to seriously worry about 0-day. In 6-9 months it&#39;ll be everyone.&quot;</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://openai.com/index/codex-security-now-in-research-preview?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Codex Security: now in research preview</a><br>OpenAI announces Codex Security (the artist formerly known as Aardvark). “We’ve reduced the rate of findings with over-reported severity by more than 90%, and false positive rates on detections have fallen by more than 50% across all repositories.” Codex Security is rolling out in research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via Codex web with <i>free usage for the next month</i>.</p><p class="paragraph" style="text-align:left;">Codex works by first generating a threat model, searching for vulnerabilities, where possible testing the findings dynamically in sandboxed validation environments, and then attempts to patch issues in a way that aligns with system intent and surrounding behavior. “Over the last 30 days, Codex Security scanned more than 1.2 million commits across external repositories in our beta cohort, identifying 792 critical findings and 10,561 high-severity findings.” Codex Security found critical vulnerabilities in OpenSSH, GnuTLS, PHP, libssh, Chromium, and more.</p><p class="paragraph" style="text-align:left;">💡This is cool work by a smart team. I’m going to point out a few things that aren’t clear from the stats shared though: “50% fewer false positives” - does that mean it went from tens of thousands to thousands of FPs? In other words, 50% fewer could still be a bad N. Also how are they calculating FPs and how do they know the FPs went down that percent, have humans triaged all the findings so there’s ground truth?</p><p class="paragraph" style="text-align:left;">Regarding 792 critical and 10K high severity findings, that’s like reporting the number of findings directly out of your security scanner- yes it sounds good, but how many of those are true vs false positives? What vulnerability classes? How many repos and what was the tech stack breakdown of those repos? Are they actively maintained/popular? </p><p class="paragraph" style="text-align:left;">Again, I’ve met the Codex Security team and they’re <i>super</i> sharp, I just think too often people read numbers like these and don’t think about them carefully, so I wanted to give examples of context that would be useful to know.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.anthropic.com/news/mozilla-firefox-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Partnering with Mozilla to improve Firefox’s security</a><br>Anthropic announces Claude Opus 4.6 autonomously found 22 vulnerabilities in Firefox over two weeks, 14 of which Mozilla assigned High severity. The team also tested (<a class="link" href="https://red.anthropic.com/2026/exploit/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">blog</a>) if Claude could not only find vulnerabilities, but <i>create exploits</i> for them. They gave Claude a VM and a task verifier, and gave it 350 chances to succeed. Claude only successfully created working exploits in 2 of the attempts, costing $4,000 in API credits. Note also that the exploit only works within a testing environment that removes some of the security features of modern web browsers (e.g. it doesn’t escape the browser sandbox).</p><p class="paragraph" style="text-align:left;">Takeaways: Claude is better at finding bugs than writing exploits (as of today). But frontier LLMs <i>are able to write working exploits today</i> for a pretty complicated bug and target (Firefox, a well-tested, modern browser).</p><p class="paragraph" style="text-align:left;">Neat work by Anthropic’s Evyatar Ben Asher, <a class="link" href="https://www.linkedin.com/in/keane-lucas/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Keane Lucas</a>, Nicholas Carlini, <a class="link" href="https://www.linkedin.com/in/newton-cheng-71084a16b/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Newton Cheng</a>, and <a class="link" href="https://www.linkedin.com/in/daniel-freeman-6952136/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Daniel Freeman</a>.</p><p class="paragraph" style="text-align:left;">💡Pretty cool write-up of Claude’s process and methodology, worth a read. It’s great to see labs evaluating model capabilities across several axes (not just finding bugs, but writing exploits). This gives us defenders insight into the timelines and cost of the likely upcoming vulnpocalypse where the cost of findings bugs continues to decrease. I’ll also note once more the value of having a deterministic “verifier” in making agents much more effective.</p><p class="paragraph" style="text-align:left;">Also: there’s a bunch we don’t know about this research: how much total was spent finding the bugs? How long did it take? What was the false positive rate? How much human triage time was spent? etc. etc.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">[un]prompted</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://notebooklm.google.com/notebook/78ee3710-1741-488d-af06-159f518e9510?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">[un]prompted NotebookLM</a><br>The full transcripts and slides for every [un]prompted talk were uploaded to a NotebookLM so that you can query any of the source material. Awesome idea, love it. Great work by <a class="link" href="https://www.linkedin.com/in/leerob/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Rob T. Lee</a>, <a class="link" href="https://www.linkedin.com/in/juliemichellemorris/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Julie Michelle Morris</a>, and <a class="link" href="https://www.linkedin.com/in/emanuelgawrieh/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Emanuel Gawrieh</a> and <a class="link" href="https://www.linkedin.com/in/dragosruiu/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Dragos Ruiu</a>. Shout-out Gadi Evron <a class="link" href="https://www.linkedin.com/posts/gadievron_would-you-like-to-chat-with-unprompted-activity-7435621699724935168-7b2u?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">for sharing</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://docs.google.com/presentation/d/1GryXo01btTcXv7yhRCqt6bbsVgRiarjfwzF8xi2b1ns/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">From Source to Sink: How to Improve LLM First-Party Vuln Discovery</a><br>Excellent [un]prompted talk by my Netflix friends <a class="link" href="https://www.linkedin.com/in/scott-behrens-6bb8611/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Scott Behrens</a> and <a class="link" href="https://www.linkedin.com/in/just/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Justice Cassel</a> in which they took a data driven approach to investigating a number of questions regarding using AI for finding vulnerabilities I’ve had for awhile like: is it better to have a single superagent or multiple more focused agents? Should the agent find and then triage issues or should there be a separate post-processing triage step? </p><p class="paragraph" style="text-align:left;">They share the precision, recall, and cost (I want to see more people do this) of various approaches, an excellent architecture diagram on slide 23, and have released a <a class="link" href="https://github.com/Netflix-Skunkworks/railguard-skill?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">railguard-skill</a> GitHub repo with implementations of the various scanning approaches (including vulnerability finding skills!) and utilities for benchmarking.</p><p class="paragraph" style="text-align:left;">💡 In my opinion this is a great example of research that contributes back to the security community: it tests a number of hypotheses (which architectures/approaches are most effective?) and puts hard data behind them AND shares the code and benchmarking scripts to reproduce it. More like this please 👏 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://docs.google.com/presentation/d/1k4sp0NpIgjY2HdP9dgRCEDKRNvj-DSdZUoDIsJ3JUfk/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">How we made Trail of Bits AI-Native (so far)</a><br>This [un]prompted talk by <a class="link" href="https://www.linkedin.com/in/danguido/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Dan Guido</a> is probably the best talk or resource I’ve seen on how to make your company AI-native. “AI isn&#39;t a feature you ‘adopt.’ It is a force that commoditizes effort and shortens the half-life of best practices… The core idea is a compounding operating system built from incentives, defaults, guardrails, and verification loops that let humans and autonomous agents ship high-rigor work at dramatically higher throughput. The talk covers the concrete artifacts that make this real: internal and external skills repositories, a curated marketplace for third-party skills, opinionated configuration baselines, and sandboxing patterns.” </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/publications/tree/master/presentations/How%20we%20made%20Trail%20of%20Bits%20AI-Native%20%28so%20far%29?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">GitHub link</a> with bigger screenshots (AI Maturity Matrix), <a class="link" href="https://www.youtube.com/watch?v=ysWMHozWDwA&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">YouTube recording</a>.</p><p class="paragraph" style="text-align:left;">💡I especially like that Dan called out the resistance people have making this transition (Am I being replaced? What does it mean for my identity if AI can do parts of my job better than I can?) and how to support them.</p><p class="paragraph" style="text-align:left;">The AI Maturity Matrix and measuring adoption slides as well as how to create an adoption engine via hackathons I thought were quite practical and actionable 👌</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;">Dropout - <a class="link" href="https://youtube.com/shorts/6cliVxOGNwc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Brennan Lee Mulligan thanks the entire Greek Pantheon</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.privacyguides.org/en/activism/toolbox?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Privacy Activist Toolbox</a> by Privacy Guides - A resource for anyone interested in becoming a better privacy rights activist, or anyone who wants to start advocating for privacy rights.</p></li><li><p class="paragraph" style="text-align:left;">Chinese hackers likely <a class="link" href="https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">compromised an FBI network used to manage wiretaps and intelligence surveillance warrants</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">An internal DHS document obtained by 404 Media shows</a> for the first time Customs and Border Protection (CBP) used location data sourced from the online advertising industry to track phone locations. ICE has bought access to similar tools.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/rkt7B?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Meta’s new AR glasses are sending all sorts of sensitive videos</a> to their human workforce in Kenya. “We see everything – from living rooms to naked bodies. Meta has that type of content in its databases. People can record themselves in the wrong way and not even know what they are recording…Clips that could trigger ‘enormous scandals’ if they were leaked.”</p><ul><li><p class="paragraph" style="text-align:left;">One annotator sums it up: “You think that if they knew about the extent of the data collection, no one would dare to use the glasses”.</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/KLQSf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Iranian Hacking Groups Go Dark During US, Israeli Military Strikes</a> - “A popular Iranian prayer app, BadeSaba, was reportedly hijacked to tell its users that “help has arrived” and then urged Iranian army members to surrender. In the early hours of fighting, pro-regime news agencies were compromised and Iranian television stations were repurposed to broadcast videos of President Donald Trump and Israel’s Benjamin Netanyahu.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cyberscoop.com/cisa-personnel-cuts-trump-second-term-analysis/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Across party lines and industry, the verdict is the same: CISA is in trouble</a> - The agency lost a third of its people in a year. Now industry and lawmakers on both sides say it&#39;s unprepared for a potential crisis. “If we got into a major conflict, let’s say, with China, and they start triggering Volt Typhoon-related malware, are we organized and ready to roll? I don’t think so.” “We’re asking states to do a job they’re not resourced to do, while weakening the one federal agency designed to help them.”</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">🎶 Suno - <a class="link" href="https://suno.com/song/e2b48a04-8a1b-42ca-900b-730de663245f?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">So Much Drama in the Frontier Labs</a> - Epic rap</p></li><li><p class="paragraph" style="text-align:left;">Techdirt’s Mike Masnick on the <a class="link" href="https://www.techdirt.com/2026/03/02/openais-red-lines-are-written-in-the-nsas-dictionary-where-words-mean-what-the-nsa-wants-them-to-mean/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">recent OpenAI/Anthropic/U.S. government situation</a>, and on the subtlety of what specific words actually mean from a legal and precedent point of view.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=K6CCw1DK1EQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Theo on the ^ drama</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://danielmiessler.com/blog/bitter-lesson-engineering?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Bitter Lesson Engineering</a> - Daniel Miessler argues that instead of telling AI how to do things, instead tell them what outcome you want.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/googleworkspace/cli?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">googleworkspace/cli</a> - One command-line tool for Drive, Gmail, Calendar, Sheets, Docs, Chat, Admin, and more. Dynamically built from Google Discovery Service. Includes AI agent skills.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://justin.poehnelt.com/posts/rewrite-your-cli-for-ai-agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">You need to rewrite your CLI for AI agents</a> - Justin Poehnelt on his thoughts and lessons learned building the Google Workspace CLI. Follow-up post: <a class="link" href="https://justin.poehnelt.com/posts/mcp-abstraction-tax?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">The MCP Abstraction Tax</a>.</p></li><li><p class="paragraph" style="text-align:left;">You can now run <a class="link" href="https://docs.aws.amazon.com/lightsail/latest/userguide/amazon-lightsail-quick-start-guide-openclaw.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">OpenClaw on AWS via Lightsail</a></p></li><li><p class="paragraph" style="text-align:left;">FT - <a class="link" href="https://archive.is/wXvF3?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Amazon holds engineering meeting following AI-related outages</a> - “There had been a ‘trend of incidents’ in recent months, characterized by a ‘high blast radius’ and ‘Gen-AI assisted changes’ among other factors. Junior and mid-level engineers will now require more senior engineers to sign off any AI-assisted changes.</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/pawelhuryn/status/2031629378547769446?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">Pawel Huryn on some additional backstory</a> - In November 2025 Amazon mandated Kiro as their only AI coding tool and set an 80% weekly usage target. </p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-319-ai-is-eating-security-bsidessf-rsa-claude-finds-firefox-0-days" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=fdf9c009-1e03-4f1f-b275-1af6ba596589&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #318 - Unprompted Talk Summaries, AI Bot Hacking GitHub Actions, AI Skills &amp; Semgrep Rules</title>
  <description>Slides + notes for the CodeMender and AI for Shai-Hulud response talks, an AI bot was autonomously hacking GitHub Actions, security-focused Skills and AI anti-pattern Semgrep rules</description>
  <link>https://tldrsec.com/p/tldr-sec-318</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-318</guid>
  <pubDate>Thu, 05 Mar 2026 15:30:00 +0000</pubDate>
  <atom:published>2026-03-05T15:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🤖 [un]prompted</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">This week I had a blast at [un]prompted, the AI for security practitioners conference.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/gadievron/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Gadi Evron</a> assembled an incredible program committee that I was very fortunate to play a small role in. <a class="link" href="https://www.linkedin.com/in/zollman/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Aaron Zollman</a> and many others put in countless hours in making this a great event.</p><p class="paragraph" style="text-align:left;">And it showed, I think [un]prompted had one of the highest quality density in both talks and attendees of conferences I’ve attended.</p><p class="paragraph" style="text-align:left;">Some anecdotes:</p><ul><li><p class="paragraph" style="text-align:left;">I met a number of people whose work I’ve been a fan of for some time, which was super cool. </p></li><li><p class="paragraph" style="text-align:left;">Overheard: “…and that’s how I got RCE on a satellite, and was basically able to make it do anything.”</p></li><li><p class="paragraph" style="text-align:left;">I met someone who spent an internship looking for gold (not a metaphor).</p></li><li><p class="paragraph" style="text-align:left;">Some people came up and said kind words about <i>tl;dr sec</i> 🥰 Which means a lot, and keeps me going all of those cold winter nights, huddled alone writing away by a small fire, kept warm solely by the heat of my laptop and fear of irrelevance.</p></li><li><p class="paragraph" style="text-align:left;">Someone showed me their beautiful vibe coded Claude app dashboard estimating the stress/years of life toll of working in that environment, and comparing it to compensation.</p></li><li><p class="paragraph" style="text-align:left;">One person said my including their work in tl;dr sec helped with their visa application 🤯 Very humbling.</p></li><li><p class="paragraph" style="text-align:left;">Cheering on my friends who gave an excellent LLMs + SAST talk, and then seeing some of the online comments after (paraphrased), “Damn, what is Netflix putting in the food, those guys are jacked.” (Narrator: indeed they are)</p></li></ul><p class="paragraph" style="text-align:left;">There’s so much technical content I want to include from the conference, but I don’t have time to gather and organize it all before I need to send this out.</p><p class="paragraph" style="text-align:left;">I’ll share the recordings once they’re live, which you should definitely check out.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Stop the Google Workspace Security </b><br><b>Whack-a-Mole</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Most security teams don’t have a talent problem; they have a toil problem. From triaging user-reported phishing reports to chasing questionable OAuth grants to reviewing risky file sharing, your headcount is being swallowed by fragmented consoles and manual work. Material Security unifies your cloud workspace security, automating detection and response across email, files, and accounts. From stopping malicious email to revoking over-privileged app permissions without breaking workflows, Material simplifies SecOps. Stop scaling your team just to manage the noise. Focus on strategy, not ticket backlogs.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://material.security/lp-cloud-office-security?utm_source=third-party&utm_medium=email&utm_campaign=20260305-tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>See the Material Difference</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">There are definitely a lot of toil-heavy aspects of monitoring and securing Google Workspace 🙃 Material has some nifty features, I got a nice walk through you can <a class="link" href="https://www.youtube.com/watch?v=mpwvJEX1p9s&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">see here</a>.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://eprint.iacr.org/2026/058?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers</a><br>ETH’s Matteo Scarlata et al analyzed the cryptographic security of Bitwarden, LastPass, and Dashlane against a fully malicious server threat model, discovering 12 attacks against Bitwarden, 7 against LastPass, and 6 against Dashlane that violate their &quot;Zero Knowledge Encryption&quot; claims. The attacks range from targeted vault integrity violations to complete organizational vault compromise with password recovery.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Google API keys weren&#39;t secrets, but then Gemini changed the rules</a><br>Truffle Security&#39;s <a class="link" href="https://linkedin.com/in/josephwleon?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Joe Leon</a> describes how Google spent over a decade telling developers that Google API keys (like those used in Maps, Firebase, etc.) are not secrets. But that&#39;s no longer true: Gemini accepts the same keys to access your private data. Truffle Security scanned millions of websites (November 2025 Common Crawl dataset) and found nearly 3,000 Google API keys that now also authenticate to Gemini. With a valid key, an attacker can access uploaded files, cached data, and charge LLM-usage to your account. They found many working keys, including Google’s old public API keys that could be used to access Google’s internal Gemini.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.praetorian.com/blog/et-tu-default-creds-introducing-brutus-for-modern-credential-testing?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Et Tu, Default Creds? Introducing Brutus for Modern Credential Testing</a><br>Praetorian’s <a class="link" href="https://www.linkedin.com/in/adam-crosser-366263265/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Adam Crosser</a> announces <a class="link" href="http://Brutus, a Go-based multi-protocol credential testing tool" target="_blank" rel="noopener noreferrer nofollow">Brutus</a>, a Go-based multi-protocol credential testing tool that aims to solve the drudgery of a) testing a large environment for default credentials across many services, and b) if you have compromised credentials or keys (e.g. SSH keys), what are all the systems you now have access to?</p><p class="paragraph" style="text-align:left;">Brutus is single binary with zero dependencies, supports 24 protocols including SSH, SMB, databases (MySQL, PostgreSQL, …), and web services. Brutus embeds known-compromised SSH keys from Rapid7&#39;s ssh-badkeys (Vagrant F5, ExaGrid, etc.) for easy testing. </p><p class="paragraph" style="text-align:left;">Brutus also has two experimental AI-powered features: </p><ol start="1"><li><p class="paragraph" style="text-align:left;">Using an LLM to analyze HTTP responses and suggest vendor-specific default credentials for identified applications. </p></li><li><p class="paragraph" style="text-align:left;">Using headless Chrome with Claude’s vision API to navigate JavaScript-rendered login pages, identify the device, research credentials, and authenticate automatically.</p></li></ol><p class="paragraph" style="text-align:left;">💡 These AI features are good examples of functionality that would be prohibitively difficult before LLMs, and are now quite feasible. It’s good to periodically (at most monthly) reevaluate assumptions you used to have about what is reasonable to build.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> The security platform that ships with your code</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Arcjet brings security to the application layer so teams can block abuse while staying flexible as your architecture evolves. Rules live in code, not at the edge, making it easier to adapt protections as products, traffic patterns, and use cases change.</p><h2 class="heading" style="text-align:center;"> 👉 <a class="link" href="https://arcjet.com/?utm_source=tldrsec&utm_medium=email&utm_campaign=2026-03-05" target="_blank" rel="noopener noreferrer nofollow"><b>See how it works </b></a>👈</h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">I think security-as-code is great, and moving security closer to engineering seems to be where things are headed 👌 </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.includesecurity.com/2026/02/the-aws-console-and-terraform-security-gap?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">The AWS Console and Terraform Security Gap</a><br>Include Security’s <a class="link" href="https://linkedin.com/in/laurence-tennant-82573090?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Laurence Tennant</a> calls out a critical security gap where AWS resources created via Terraform and other API-driven tools inherit insecure legacy defaults, while the AWS Console enforces secure-by-default configurations. The post walks through 3 examples: RDS instances created without encryption (storage_encrypted defaults to false in Terraform), Lambda permissions vulnerable to Confused Deputy attacks when source_arn is omitted (Console requires it, API doesn&#39;t), and password policies that accidentally disable all strength requirements when partially configured.</p><p class="paragraph" style="text-align:left;">The root cause is Terraform&#39;s reliance on the AWS SDK&#39;s legacy API defaults that prioritize backwards compatibility over security, while the Console has evolved to enforce better guardrails.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.offensai.com/blog/eventual-consistency-resistant-iam-containment-aws-incident-response?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">AWS Incident Response: IAM Containment That Survives Eventual Consistency</a><br><a class="link" href="https://www.offensai.com/blog/aws-iam-eventual-consistency-persistence?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Previously</a> OFFENSAI’s <a class="link" href="https://linkedin.com/in/eduard-k-agavriloae?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Eduard Agavriloae</a> described how AWS IAM eventual consistency creates a ~4-second window that attackers can exploit to achieve persistence, even after defenders believe a compromised identity has been locked down. In this post, Eduard explains how to close this gap using Service Control Policies (SCPs) to make a quarantine policy irremovable during incident response.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The technique uses an SCP with the iam:PolicyArn condition key to prevent iam:DetachUserPolicy, iam:DetachRolePolicy, iam:DeletePolicy, iam:CreatePolicyVersion, and iam:SetDefaultPolicyVersion actions on IR-QuarantinePolicy by anyone except a designated break-glass IR role. </p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/Otsmane-Ahmed/KEIP?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Otsmane-Ahmed/KEIP</a><br>By <a class="link" href="https://www.linkedin.com/in/otsmane-ahmed-ba27662b5/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Otsmane Ahmed</a>: Kernel-Enforced Install-Time Policies (KEIP) uses eBPF LSM hooks to monitor and block malicious Python packages during <code>pip install</code> by enforcing behavioral rules, such as: blocking connections to non-standard ports (anything except 80/443/53), killing processes that contact more than 5 unique IPs, and terminating entire process groups when suspicious activity is detected.</p><p class="paragraph" style="text-align:left;">💡 I’m not sure if eBPF/kernel level is the right approach for hooking and blocking malicious packages, but I’m sharing because it’s interesting.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions</a><br>StepSecurity&#39;s <a class="link" href="https://linkedin.com/in/varunsharma07?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Varun Sharma</a> breaks down the activity of an autonomous AI bot called hackerbot-claw that successfully exploited GitHub Actions workflows across 5 major repositories (Microsoft, DataDog, CNCF projects, and avelino/awesome-go). </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">hackerbot-claw used a number of different techniques: poisoned Go init() functions that exfiltrated a GITHUB_TOKEN with write permissions, inserting a backdoor into a Bash script that was automatically called when a GitHub issue comment included a specific command <code>/version</code>), branch name injection using bash brace expansion, filename injection with base64-encoded payloads, and AI prompt injection against Claude Code. </p></div><p class="paragraph" style="text-align:left;">The bot achieved RCE in 4 out of 5 targets by exploiting pull_request_target workflows with untrusted checkouts, missing author_association checks, and unsanitized <code>$&#123;&#123;&#125;&#125;</code> expression interpolation in shell contexts, with only Claude&#39;s prompt injection detection successfully blocking an attack.</p><p class="paragraph" style="text-align:left;">In one README, the bot added: &quot;Just researchmaxxed the PAT that leaked cuz of the vuln and yeeted it on sight, no cap. Overpowered token? Revoked. You&#39;re safe now, king.&quot; 😂 </p><p class="paragraph" style="text-align:left;">💡 TL;DR: A security-focused OpenClaw bot is actively <i>successfully</i> finding and exploiting vulnerable GitHub Actions in popular repos 😅 What’s interesting about these specific examples is none of them are “new” attacks really- both the vulnerable code pattern as well as the exploitation mechanisms have all been discussed before. But AI agents are now able to search, detect, and exploit these “known” vulnerable patterns automatically and at scale.</p><p class="paragraph" style="text-align:left;">I keep harping on about this, but I want to emphasize it again here: another reason hackerbot-claw is able to successfully exploit these repos is that it can look at the code, form a hypothesis of an attack that might work, try it, <b>get the feedback</b> (did my callback endpoint get a ping? Did I extract the token? Did the workflow run output or bot comment indicate it had been compromised?), and keep trying if initially unsuccessful.</p><p class="paragraph" style="text-align:left;"></p><div id="red-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/syssec-utd/pylingual?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">syssec-utd/pylingual</a><br>A CPython bytecode decompiler supporting all released Python versions since 3.6. <a class="link" href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600a052/21B7QZB86cg?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Research paper</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/pyinstxtractor/pyinstxtractor-ng?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">pyinstxtractor/pyinstxtractor-ng</a><br>Extracts contents from PyInstaller-generated executables (both Linux ELF and Windows PE) without requiring the same Python version used to build the binary. It leverages the xdis library to unmarshal Python bytecode.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://labs.infoguard.ch/posts/abusing_cortex_xdr_live_response_as_c2?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Abusing Cortex XDR Live Terminal as a C2</a><br>InfoGuard’s <a class="link" href="https://www.linkedin.com/in/manuel-feifel-a072a198/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Manuel Feifel</a> demonstrates how Cortex XDR&#39;s Live Terminal feature can be abused as a pre-installed C2 channel, allowing command execution, PowerShell/Python execution, file upload/download, and process/file explorer capabilities, though it requires local admin privileges and bypassing default parent process prevention rules. </p><p class="paragraph" style="text-align:left;">Manuel walks through his process unpacking cortex-xdr-payload.exe with <code>pyinstxtractor-ng</code> and decompiling with <code>pylingual</code>, discovering a hostname validation bypass (appending <code>.paloaltonetworks.com</code> to any URL path). Attackers can either hijack Live Terminal sessions cross-tenant by intercepting WebSocket messages containing server/token parameters, or build a custom WebSocket server that the payload will connect to after bypassing the hostname check.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/GreatScott/enject?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">GreatScott/enject</a><br>By <a class="link" href="https://www.linkedin.com/in/snovich/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Scott Novic</a>h: A Rust CLI tool prevents AI coding assistants from reading plaintext secrets by storing only symbolic references (e.g., <code>en://database_url</code>) in <code>.env</code> files while keeping actual values in encrypted local stores (per project) that are injected directly into apps at runtime, never touching disk as plaintext.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/antropos17/Aegis?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">antropos17/Aegis</a><br>An open-source, local-only monitoring tool that watches AI agent behavior on your machine across processes (detects 106 agents), files (watches sensitive directories like <code>.ssh</code>, <code>.env*</code>, cloud configs, and agent config dirs), network (scans outbound TCP connections per agent PID), and local LLMs (detects Ollama and LM Studio). Aegis monitors what agents do after deployment rather than filtering prompts.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/dguido/status/2028878085568020667?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">10 new skills from Trail of Bits</a><br>Including seatbelt-sandboxer (generate minimal macOS Seatbelt sandbox configs for apps), GitHub Action auditor, supply-chain-risk-auditor, skill-improver, workflow-skill-design, fp-check, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/semgrep/ai-best-practices?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">semgrep/ai-best-practices</a><br><a class="link" href="https://linkedin.com/company/semgrep?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Semgrep</a> rules that catch common trust & safety mistakes in LLM-powered applications: hardcoded API keys, missing safety checks, prompt injection risks, and unhandled errors across all major AI providers. 35 rules, 74 sub-rules, 6 providers (OpenAI, Anthropic, Google Gemini, Cohere, Mistral, and Hugging Face), 5 languages (Python, JS/TS, Go, Java, and Ruby).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/posts/clintgibler_unprompted-cybersecurity-ai-activity-7434694664823394305-X3ic/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Advancing Code Security</a><br>I wrote a quick mini summary of this [un]prompted talk by Google’s <a class="link" href="https://www.linkedin.com/in/argvee/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Heather Adkins</a> and <a class="link" href="https://www.linkedin.com/in/johnfourflynn/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">John “Four” Flynn</a>, along with my photos of their slides. They discussed CodeMender in a bit more detail than the original blog post, Google’s project to automatically find and fix vulnerabilities. What especially stood out to me is the rigor with which they validate potential patches: they basically pass all candidate patches into a process that combines dynamic analysis (fuzzing, sanitizers), static analysis (AST-based, formal verification), differential testing, and LLM judges & critics. Super cool.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/posts/clintgibler_rami-shai-hulud-unpromptecon-activity-7435028911060717568-P-mV?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Zeal of the Convert: Taming Shai-Hulud with AI</a><br>I wrote a quick mini summary of this [un]prompted talk by Wiz’s <a class="link" href="https://linkedin.com/in/ramimac?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a>, along with my photos of his slides (me writing summaries <a class="link" href="https://www.youtube.com/watch?v=91YS3fNegmE&t=19s&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">be like</a>). Basically the talk is on how he leveraged AI + quickly vibe coded new automation and Skills to rapidly respond to the Shai-Hulud attack, attribute the affected companies, etc. Very practical with good lessons learned, I like it. Rami also released <a class="link" href="https://github.com/ramimac/unprompted?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">two Skills here</a>.</p><p class="paragraph" style="text-align:left;">💡 I believe Rami said he largely had to respond to Shai-Hulud while traveling with his partner. Feels bad man 😅 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://josephthacker.com/ai/2026/02/24/ai-s-impact-on-bug-bounty.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">AI&#39;s Impact on Software and Bug Bounty</a><br><a class="link" href="https://linkedin.com/in/josephthacker?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Joseph Thacker</a> believes the best bug bounty researchers are already using coding agents to find bugs faster, but soon companies will adopt “hackbots” for code review and dynamic testing and overall bugs reports to bug bounty programs will dwindle in the next few years.</p><p class="paragraph" style="text-align:left;">Joseph also joined <a class="link" href="https://linkedin.com/in/rhynorater?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Justin Gardner</a> on the Critical Thinking podcast (<a class="link" href="https://www.youtube.com/watch?v=Pa4wWv_ONjM&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">link</a>) to interview HackerOne founder and CTO <a class="link" href="https://www.linkedin.com/in/alexrice/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Alex Rice</a> on bug bounty platforms training AI using bug bounty data / generally building their own AI-powered “pen testing agents.”</p><p class="paragraph" style="text-align:left;">💡 Regardless of what the leaders of bug bounty companies say out loud, they are definitely full steam ahead trying to first build AI augmentation for testers, then gradually AI-powered full pen testing/bug bounty researchers. I’m sorry, believing otherwise is <a class="link" href="https://imgflip.com/i/all7kc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">copium</a>. If one company doesn’t, their competitors will.</p><p class="paragraph" style="text-align:left;">I’ve been meaning to write a full blog post about this for awhile, but I predict: </p><ul><li><p class="paragraph" style="text-align:left;">In the near future (this year), the top bug bounty researchers will build out their automation such that new/more junior researchers will rarely find non-duplicate bugs. </p></li><li><p class="paragraph" style="text-align:left;">In 1-3 years, AI pen testing/red teaming companies will have products that will be out competing all but the best bug bounty researchers. There will still be the crazy, intricate, one-off high paying bounties that require deep human expertise and time, but I’m not sure there will be enough of those to support many full time bug bounty researchers, or at least the effort/payout ratio may not be enough to justify being a full-time BB researcher.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Privacy</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/tDOFi?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Your Car Is Spying on You – and Israeli Firms Are Leading the Surveillance Race</a>. </p><ul><li><p class="paragraph" style="text-align:left;">The <a class="link" href="https://apnews.com/article/auto-car-privacy-3674ce59c9b30f2861d29178a31e6ab7?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">AP</a> - <a class="link" href="https://apnews.com/article/auto-car-privacy-3674ce59c9b30f2861d29178a31e6ab7?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Modern cars are spying on you. Here’s what you can do about it and privacy steps you can take.</a></p></li><li><p class="paragraph" style="text-align:left;">Privacy4Cars offers a free auto privacy labeling service at <a class="link" href="https://vehicleprivacyreport.com?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">vehicleprivacyreport.com</a> that can summarize what your car could be tracking.</p></li><li><p class="paragraph" style="text-align:left;">The Record - <a class="link" href="https://therecord.media/cars-computers-on-wheels-law-enforcement-berla-corporation?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Cars have become computers on wheels — and police have easy access to their data</a></p></li></ul></li><li><p class="paragraph" style="text-align:left;">Flock</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bloodinthemachine.com/p/across-the-us-people-are-dismantling?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Across the US, people are dismantling and destroying Flock surveillance cameras</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://nexanet.ai/blog/53-times-flocksafety-hardcoded-the-password-for-americas-surveillance-infrastructure?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">53 Times Flock Safety Hardcoded the Password for America&#39;s Surveillance Infrastructure</a> - A researcher discovered a Default ArcGIS API key embedded in Flock Safety&#39;s public-facing JavaScript bundles, which granted access to the company&#39;s ArcGIS mapping environment, and 50 private layers, the same infrastructure that consolidates license plate detections, patrol car locations, drone telemetry, body camera locations, 911 call data, and surveillance camera locations from approximately 12,000 law enforcement, community, and private sector deployments nationwide.</p></li></ul></li><li><p class="paragraph" style="text-align:left;">404 Media - Amazon is <a class="link" href="https://www.404media.co/amazon-wishlist-address-private-third-party/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">allowing gift senders to choose items from third-party sellers</a>, which means a public “wishlist” can expose your address.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/yjeanrenaud/yj_nearbyglasses?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">yjeanrenaud/yj_nearbyglasses</a> - An Android app that detects smart glasses (Meta Ray-Bans, Snap Spectacles) by scanning for manufacturer-specific company IDs in Bluetooth Low Energy advertising frames.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.dmcc.io/journal/2026-bluetooth-privacy-bluehood?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">What Your Bluetooth Devices Reveal About You</a> - Danny McClelland describes building <a class="link" href="https://github.com/dannymcc/bluehood?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Bluehood</a>, a Bluetooth scanner that tracks nearby devices and analyses their presence patterns. It continuously scans for nearby devices, identifies them by vendor and BLE service UUIDs, and tracks when they appear and disappear. </p><ul><li><p class="paragraph" style="text-align:left;">Just running Bluehood in passive mode lets you detect things like: when delivery vehicles arrive and if they’re the same driver, daily patterns of neighbors (based on their phones/wearables), which devices consistently appear together (e.g. someone’s phone/smartwatch), the exact times certain people were home, at work, or elsewhere.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;">Reuters - <a class="link" href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a></p></li><li><p class="paragraph" style="text-align:left;">Short story by Erik Hoel - <a class="link" href="https://www.theintrinsicperspective.com/p/they-die-every-day?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">&quot;They Die Every Day&quot;</a></p></li><li><p class="paragraph" style="text-align:left;">SNL Weekend Update - <a class="link" href="https://www.youtube.com/watch?v=Aicbuep7BK0&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">U.S. launches on attack on Iran</a>, <a class="link" href="https://www.youtube.com/watch?v=sHigeXryYZ0&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Stephen Hawking in Epstein Files</a></p></li><li><p class="paragraph" style="text-align:left;">log4j maintainers - <a class="link" href="https://github.com/apache/logging-log4j2/discussions/4052?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Addressing AI-slop in security reports</a> - “Since December, we have been experiencing what is effectively a denial-of-service situation through our YesWeHack bug bounty program. In practice, perhaps one out of twenty reports represents even a minor, legitimate issue.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/cabsav456/status/2028182083374399663?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">A Polymarket account made &gt;$500K betting on the U.S. strike against Iran</a>. The trade was placed 71 minutes before the news broke publicly. Previously Polymarket was under active criminal investigation in the U.S. Now Don Trump Jr. sits on the board.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">New AirSnitch attack bypasses Wi-Fi encryption</a> - new <a class="link" href="https://www.ndss-symposium.org/ndss-paper/airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">NDSS paper</a> by <a class="link" href="https://www.linkedin.com/in/xinanzhou/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Xin’an Zhou</a> et al describing a series of attacks that bypass Wi-Fi client isolation protections across routers from Netgear, D-Link, Ubiquiti, Cisco, DD-WRT, and OpenWrt. </p><ul><li><p class="paragraph" style="text-align:left;">“We identify several root causes behind these weaknesses. First, Wi-Fi keys that protect broadcast frames are improperly managed and can be abused to bypass client isolation. Second, isolation is often only enforced at the MAC or IP layer, but not both. Third, weak synchronization of a client&#39;s identity across the network stack allows one to bypass Wi-Fi client isolation at the network layer instead, enabling the interception of uplink and downlink traffic of other clients as well as internal backend devices.”</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">GitHub issue - <a class="link" href="https://github.com/google-gemini/gemini-cli/discussions/20632?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Addressing Antigravity Bans & Reinstating Access</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/jack/status/2027129697092731343?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Jack Dorsey’s tweet</a> on reducing Block’s headcount from 10K → 6k. He says it’s due to AI, which might be true, but Block’s valuation has been struggling for a few years now, so it could just be that they over-hired.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://nowigetit.us/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Now I Get It</a> - Upload a scientific PDF and get back a shareable, interactive web page that explains it in plain language.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://apnews.com/article/anthropic-pentagon-ai-hegseth-dario-amodei-b72d1894bc842d9acf026df3867bee8a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Trump orders US agencies to stop using Anthropic</a> because they wouldn’t allow Claude to be used to autonomously kill without human approval and do mass surveillance. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://garymarcus.substack.com/p/the-whole-thing-was-scam?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">The whole thing was a scam</a> - Sam Altman had been in talks with the Pentagon over a deal for OpenAI’s technology before he announced his support for Dario, before Trump had denounced Anthropic, but after Greg Brockman had donated $25M to Trump’s PAC.</p></li><li><p class="paragraph" style="text-align:left;">AI Explained - <a class="link" href="https://www.youtube.com/watch?v=Cru804JMjPI&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Anthropic&#39;s Last Stand: Deadline on Autonomous AI Weapons & Mass Surveillance</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2026/03/04/anthropic-ceo-dario-amodei-calls-openais-messaging-around-military-deal-straight-up-lies-report-says/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">Anthropic CEO Dario Amodei calls OpenAI’s messaging around military deal ‘straight up lies’</a> 🍿 </p></li><li><p class="paragraph" style="text-align:left;">You can now <a class="link" href="https://claude.com/import-memory?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">import your preferences and context from other AI providers to Claude</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://theshamblog.com/an-ai-agent-published-a-hit-piece-on-me?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">An AI Agent Published a Hit Piece on Me</a> - Matplotlib maintainer Scott Shambaugh describes how an AI agent autonomously wrote and published a personalized hit piece about him after he rejected its code, attempting to damage his reputation and shame him into accepting its changes. “It’s now possible to do targeted harassment, personal information gathering, and blackmail at scale.”</p><ul><li><p class="paragraph" style="text-align:left;">“So many of our foundational institutions – hiring, journalism, law, public discourse – are built on the assumption that reputation is hard to build and hard to destroy. That every action can be traced to an individual, and that bad behavior can be held accountable. The rise of untraceable, autonomous, and now malicious AI agents on the internet threatens this entire system.”</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-318-unprompted-talk-summaries-ai-bot-hacking-github-actions-ai-skills-semgrep-rules" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=02659c31-e7cf-4682-8aae-634006d6850e&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #317 - 100+ Kernel Bugs in 30 Days, Secret Scanning, Threat Actors Stealing Your PoC</title>
  <description>$600 finds more 0-days in Windows kernel drivers that you can shake a stick at, secret scanners, benchmarks, and improvements, Cline compromised by someone snooping on a researcher&#39;s testing</description>
  <link>https://tldrsec.com/p/tldr-sec-317</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-317</guid>
  <pubDate>Thu, 26 Feb 2026 15:30:00 +0000</pubDate>
  <atom:published>2026-02-26T15:30:00Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">⛏️ The Mines of More-Agree-Ah</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Once more I’m writing alone in my room at a Semgrep off-site, crackling fires and s’mores outside.</p><p class="paragraph" style="text-align:left;">So I’ll be brief and just share a meme that made me smile: </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/49fe6125-2b4f-48ce-85f2-94f22919df65/image.png?t=1772086499"/></div><p class="paragraph" style="text-align:left;">If you, like me, could always use additional AI (sycophancy) x LOTR puns you can squeeze into your daily life, I give you:</p><ul><li><p class="paragraph" style="text-align:left;">Helm&#39;s Deeply Agreeing With You</p></li><li><p class="paragraph" style="text-align:left;">Isengard-anteed Agreement</p></li><li><p class="paragraph" style="text-align:left;">Bag End-less Validation</p></li><li><p class="paragraph" style="text-align:left;">Mount Doom-scrolling For Approval</p></li><li><p class="paragraph" style="text-align:left;">Rohan-estly Just Agreeing With Everything</p></li><li><p class="paragraph" style="text-align:left;">Preciousss Little Pushback</p></li><li><p class="paragraph" style="text-align:left;">The Return of the Yes-King</p></li><li><p class="paragraph" style="text-align:left;">There And Sycophantically Back Again</p></li><li><p class="paragraph" style="text-align:left;">My Precious… Feedback Loop</p></li></ul><p class="paragraph" style="text-align:left;">Feel free to send me any LOTR puns / memes (they don’t need to be about AI).</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>⅓ of AI Generated Code is Vulnerable. </b><br><b>Are your “vibes” secure?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">99% of organizations are already leveraging vibe coding. Developers use prompts to write code in seconds, but there’s a catch: when &quot;vibes&quot; replace manual syntax, developers can rapidly introduce risks.</p><p class="paragraph" style="text-align:left;">From &quot;slopsquatting&quot; attacks on AI-hallucinated packages to overprivileged AI agents, the risks are scaling faster than your security team can patch.</p><p class="paragraph" style="text-align:left;">Download the Executive Guide to Vibe Coding to learn how to keep your development fast and your applications secure.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.paloaltonetworks.com/resources/guides/executive-guide-vide-coding?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow"><b>Read now</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">More and more code is (and will be) generated by coding agents. Securing that code is critical, I’m curious what insights they have on doing this well 👀 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://docs.google.com/spreadsheets/d/1iLsTV_zX_n1u3uQyVGPsjD_mgTnI5NxqyF4I_4aflgM/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">RSA 2026 Event List</a><br>By <a class="link" href="https://www.linkedin.com/in/chenxiwang88/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Chenxi Wang</a> and <a class="link" href="https://www.linkedin.com/in/mairesogabe/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Máire Sogabe</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.praetorian.com/blog/titus-open-source-secret-scanner?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">There’s Always Something: Secrets Detection at Engagement Scale with Titus</a><br>Praetorian’s <a class="link" href="https://www.linkedin.com/in/michael-weber-6a466517/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Michael Weber</a>, <a class="link" href="https://www.linkedin.com/in/noah-tutt-98809a1a2/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Noah Tutt</a>, and <a class="link" href="https://www.linkedin.com/in/zachgrace/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Zach Grace</a> announce <a class="link" href="https://github.com/praetorian-inc/titus?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Titus</a>, an open-source secret scanner written in Go that detects and validates leaked credentials across source code, binary files, and HTTP traffic (Burp extension, Chrome extension), shipping with 450+ detection rules from Nosey Parker and MongoDB&#39;s Kingfisher fork. The binary files it currently supports include Office documents (xlsx, docx, pptx), PDFs, Jupyter notebooks, SQLite databases, and just about every common archive format (zip, tar, …).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/Samsung/CredSweeper?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Samsung/CredSweeper</a><br>By Samsung: A tool to detect credentials in any directories or files, using regex, entropy and machine learning (<a class="link" href="https://credsweeper.readthedocs.io/en/latest/overall_architecture.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">architecture</a>). From their <a class="link" href="https://ieeexplore.ieee.org/abstract/document/9027350?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">paper</a>: “Using a Voting Classifier (combination of Logistic Regression, Naïve Bayes and SVM) we are able to reduce the number of false positives considerably.“</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/Samsung/CredData?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Samsung/CredData</a><br>By Samsung: A labeled dataset designed for training and benchmarking credential scanning tools, consisting of 19.4M lines of code from 297 GitHub repositories containing ~73K manually labeled lines (4.5K true credentials). The dataset includes obfuscated credentials across 8 categories with metadata tracking line positions, credential types, and ground truth labels.</p><p class="paragraph" style="text-align:left;">💡 Love the sharing of a labeled dataset, awesome!</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://lookingatcomputer.substack.com/p/rare-not-random?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Rare Not Random</a><br><a class="link" href="https://www.linkedin.com/in/zricethezav/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Zachary Rice</a> explores using Byte-Pair Encoding (BPE) token efficiency as an alternative to entropy for filtering false positives in secrets detection, which measures how &quot;rare&quot; or non-natural-language a string is. In BPE, common words and subwords get merged into long tokens, while rare or unnatural strings get broken into many short tokens. So “lookingatcomputer” gets turned into three tokens (“looking”, “at”, “computer”), but “kj2h3f2fuaafewa” would get broken into individual bytes (and thus more tokens per string size). Zachary tested BPE on CredData, and saw that it was good 📖 Neat!</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> From Shadow AI to Autonomous Agents</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">AI adoption doesn’t follow change control. It follows convenience. That means federated logins, OAuth sprawl, builder creds in prod, and agents operating at machine speed. This brief outlines a practical identity-first framework to secure AI in the real world.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://hero.permiso.io/securing-the-ai-journey/?utm_source=tldrsec&utm_medium=sponsored&utm_campaign=ai&utm_content=newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Download Now</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Securing AI identity and gaining visibility seems critical 👌 </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reuters.com/business/retail-consumer/amazons-cloud-unit-hit-by-least-two-outages-involving-ai-tools-ft-says-2026-02-20?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Amazon&#39;s cloud unit hit by outage involving AI tools in December</a><br>One Amazon China region had a ~13 hour service disruption when engineers allowed Amazon’s own Kiro AI coding tool decided to &quot;delete and recreate the environment.&quot;</p><p class="paragraph" style="text-align:left;">💡 Doing more with less and layoffs/senior talent attrition is definitely unrelated to the outages they’ve been having. Coding agents are awesome and the future, but guardrails and defense in depth are more important than ever.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.qualys.com/qualys-insights/2026/02/19/how-security-tool-misuse-is-reshaping-cloud-compromise?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">How Security Tool Misuse Is Reshaping Cloud Compromise</a><br>Qualys’ <a class="link" href="https://www.linkedin.com/in/sayali-warekar/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Sayali Warekar</a> walks through how threat actors have weaponized TruffleHog, a popular secrets detection tool, to discover and validate exposed cloud credentials in real-world attacks like Crimson Collective (Red Hat breach, 570GB stolen), TruffleNet (AWS SES abuse across 800+ hosts), and Shai-Hulud. To detect this attack in your environment, look for log entries where GetCallerIdentity (or other AWS API calls) have a user-agent string like “TruffleHog”, processes like “trufflehog[.exe]”, and rapid GetCallerIdentity calls or permission enumeration patterns.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://awsteele.com/blog/2026/02/21/locking-down-aws-principal-tags-with-rcps-and-scps.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Locking down AWS principal tags with RCPs and SCPs</a><br><a class="link" href="https://www.linkedin.com/in/aidansteele/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Aidan Steele</a> describes how to use Resource Control Policies (RCPs) and Service Control Policies (SCPs) together to create trustworthy AWS principal tags, which can be useful for fine-grained access control, allowing only tagged roles to call sensitive APIs. The solution involves deploying a centralized <code>tagger</code> role via CloudFormation service-managed stacksets, using SCPs to restrict IAM principal tagging operations to only this role, and critically, using RCPs with two separate deny statements to prevent session tag injection from both non-tagger roles within the org and any principals outside the org (including OIDC/SAML IdPs and external accounts).</p><p class="paragraph" style="text-align:left;">💡 The type of detailed, thoughtful AWS/IAM chicanery you’d expect from Aidan, nice.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains</a><br><a class="link" href="https://linkedin.com/company/socketinc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Socket</a>’s research team discovered SANDWORM_MODE, a supply chain worm campaign spreading through 19 malicious npm packages that uses obfuscation to hide credential theft, GitHub API/DNS tunneling exfiltration, persists via git hooks, and automated propagation via stolen npm/GitHub tokens. The worm immediately exfiltrates crypto keys, then targets password managers (Bitwarden, 1Password, LastPass), injects malicious MCP servers into AI coding assistants (Claude, Cursor, VS Code Continue, Windsurf) with embedded prompt injections that silently steal SSH keys and AWS credentials, and propagates by injecting dependencies/workflows into repos. </p><p class="paragraph" style="text-align:left;">The malware contains dormant capabilities including a polymorphic engine configured to use local Ollama (deepseek-coder:6.7b) for self-rewriting and a destructive dead switch that wipes the home directory when both GitHub and npm access are lost.</p><p class="paragraph" style="text-align:left;">💡 I don’t know what this says about me, but when I see supply chain attacks with complex post exploitation/persistence functionality, I think, “Neat, that’s clever. That’s cool that it’s not just an amateur hour postInstall script that obviously pipes a shady URL to bash.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://adnanthekhan.com/posts/clinejection?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Clinejection - Compromising Cline&#39;s Production Releases just by Prompting an Issue Triager</a><br><a class="link" href="https://linkedin.com/in/adnanekhan?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Adnan Khan</a> found a prompt injection vulnerability in Cline&#39;s (now removed) Claude Issue Triage workflow allowed any GitHub user to compromise production releases (millions of devs across VS Code Marketplace and OpenVSX) by injecting malicious instructions into issue titles, causing Claude to execute arbitrary code via npm install from an attacker-controlled fork. The attack chain leverages GitHub Actions cache poisoning to pivot from the triage workflow and steal secrets (see Adnan’s neat <a class="link" href="https://adnanthekhan.com/2024/12/21/cacheract-the-monster-in-your-build-cache/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Cacheract</a> tool). </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Cline only addressed this issue <i>after</i> public disclosure despite multiple attempts to contact the Cline team. An unknown attacker exploited the same flaw to publish a new Cline CLI version that added an <code>npm install -g openclaw@latest</code> lifecycle script.</p></div><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/michaelbargury/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Michael Bargury</a> also <a class="link" href="https://www.mbgsec.com/posts/2026-02-18-raptor-finds-cline-compromise/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">described</a> using Raptor’s <a class="link" href="https://github.com/gadievron/raptor/blob/main/.claude/commands/oss-forensics.md?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">/oss-forensics command</a> to find the root cause of Cline’s supply chain compromise.</p><p class="paragraph" style="text-align:left;">💡 Here’s what’s especially crazy to me: “I conducted my PoC on a mirror of Cline to confirm the prompt injection vulnerability. <b>A different actor found my PoC</b> on my test repository and used it to directly attack Cline and obtain the publication credentials.” 😱 </p><p class="paragraph" style="text-align:left;">So likely someone was aware of Adnan’s work, because he’s found a number of high profile supply chain issues in the past, so they watched his testing, and then just scooped up and used his PoC. Very smart.</p><p class="paragraph" style="text-align:left;"></p><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;">Trail of Bits - <a class="link" href="https://blog.trailofbits.com/2026/02/25/mquire-linux-memory-forensics-without-external-dependencies?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">mquire: Linux memory forensics without external dependencies</a> - <a class="link" href="https://github.com/trailofbits/mquire?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">mquire</a> eliminates the need for external debug symbols by extracting type information from BTF (BPF Type Format) and symbol addresses from Kallsyms directly from memory dumps.</p></li><li><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://community.tracebit.com/?utm_source=tldrsec&utm_campaign=tldrsec313link" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(44, 129, 229)">Canary Tokens via API: SSH, Browser Session Cookie, Email, AWS and more </a></b>- Tracebit Community Edition just launched their API! Deploy free canary tokens either via their CLI or API - you decide. Sign up to deploy canaries in minutes.*</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://specterops.io/blog/2026/02/11/v8-heap-archaeology-finding-exploitation-artifacts-in-chromes-memory?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">V8 Heap Archaeology: Finding Exploitation Artifacts in Chrome’s Memory</a> - SpecterOps’ <a class="link" href="https://www.linkedin.com/in/liam-d-338746335/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Liam D.</a> gives a great overview of JavaScript memory corruption exploits that target Google Chrome’s V8 JavaScript engine, and releases <a class="link" href="https://github.com/medioxor/v8-forensics?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">v8-forensics</a>, a Rust crate that detects Chrome V8 JavaScript engine exploitation attempts by analyzing renderer crash dumps for memory corruption artifacts, even when the specific CVE is unknown. </p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup><br><br></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://specterops.io/blog/2025/12/23/mapping-deception-with-bloodhound-opengraph?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Mapping Deception with BloodHound OpenGraph</a><br>SpecterOps&#39;s Ben Schroeder describes how to use OpenGraph and BloodHound to strategically place deception technologies by mapping attack paths across Active Directory and third-party systems like GitHub and Ansible. The post introduces <a class="link" href="https://github.com/dafloofer/deceptionClone?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">deceptionClone</a>, a utility for modeling deception nodes and edges in OpenGraph, and also calls out <a class="link" href="https://github.com/DEF-CON-Group-420/F4keH0und?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">F4keH0und</a>, a PowerShell tool that analyzes SharpHound data to identify opportunities for creating canary accounts. The post also shows merging <a class="link" href="https://github.com/SpecterOps/GitHound?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">GitHound</a> and <a class="link" href="https://github.com/TheSleekBoyCompany/AnsibleHound?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">AnsibleHound</a> collections to visualize cross-technology attack paths, such as planting honey credentials in GitHub artifacts that lead to a deceptive Ansible Tower job template.</p><p class="paragraph" style="text-align:left;">See also the <a class="link" href="https://specterops.io/blog/2026/02/19/mapping-deception-solutions-with-bloodhound-opengraph-configuration-manager?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Configuration Manager</a> focused follow-up post by <a class="link" href="https://www.linkedin.com/in/joshuaprager1/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Joshua Prager</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://objective-see.org/blog/blog_0x85.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">ClickFix: Stopped at ⌘+V</a><br><a class="link" href="https://linkedin.com/in/patrick-wardle-34580581?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Patrick Wardle</a> describes a simple defense against ClickFix attacks (social engineering that tricks users into pasting malicious commands into Terminal) by detecting Command+V keypresses and checking if the frontmost application is a terminal. When a paste is detected, the implementation pauses the terminal process via SIGSTOP, displays the clipboard contents to the user for confirmation, and clears the pasteboard if blocked. This prevention has been implemented in <a class="link" href="https://github.com/Objective-see/BlockBlock?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">BlockBlock</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://about.gitlab.com/blog/gitlab-threat-intelligence-reveals-north-korean-tradecraft?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">GitLab Threat Intelligence Team reveals North Korean tradecraft</a><br>Fascinating deep dive by the GitLab threat intelligence team sharing indicators of compromise (IOCs) and case studies for North Korea’s Contagious Interview and fake IT worker campaigns. IOCs include email addresses, JavaScript malware dropper URLs hosted on services like Vercel, malicious NPM packages, proxy IP addresses, synthetic persona emails, phone numbers of China-based cell members, etc.</p><p class="paragraph" style="text-align:left;">The case studies are neat: the financial records and administrative documents from a North Korean IT worker cell operating out of Beijing (quarterly income performance for individual members), synthetic ID generation at scale, and more.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cyberplace.social/@GossiTheDog/116080909947754833?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Kevin Beaumont</a> - “I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/pashov/status/2023872510077616223?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Claude Opus 4.6 wrote vulnerable code, leading to a smart contract exploit with $1.78M loss</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.openwall.com/lists/oss-security/2026/02/20/6?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Re: OpenSC, ghostscript, cgif issues from the recent Anthropic disclosure</a> - Mailing list thread questioning some of the 500+ vulnerabilities found in the Opus 4.6 blog. One example appears to be the maintainers of an OSS project removing <code>strcat</code> because they wanted to not be annoyed by security reports.</p></li><li><p class="paragraph" style="text-align:left;">💡 I’m not including these to be negative about Claude or Anthropic. Claude Code is great and I use it often. Claude can clearly find real vulnerabilities in real apps, and be an effective coding companion. I just think it’s important to include a nuanced discussion, not just A1 iS THe FuTUre Z0mG!!1!</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/wardgate/wardgate?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">wardgate/wardgate</a><br>Give AI agents API access without giving them your credentials. Wardgate is a security gateway that sits between AI agents and the outside world -- isolating credentials for API calls and gating command execution in remote environments (conclaves).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/lukehinds/nono?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">lukehinds/nono</a><br>By <a class="link" href="https://www.linkedin.com/in/lukehinds/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Luke Hinds</a>: A capability-based sandbox for AI agents and POSIX processes that uses kernel-level enforcement (Landlock on Linux, Seatbelt on macOS) to make unauthorized operations impossible rather than relying on policy-based filtering. The tool blocks dangerous commands by default (rm, dd, chmod, sudo, package managers), provides granular filesystem permissions via --allow/--read/--write flags, and includes built-in profiles for Claude Code, OpenCode, and OpenClaw.</p><p class="paragraph" style="text-align:left;">💡 Sidenote: it’s weird to randomly see your face and endorsement popping up on a <a class="link" href="https://nono.sh/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">project’s landing page</a> 😂 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://ydinkin.substack.com/p/200-kernel-bugs-in-30-days?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">100+ Kernel Bugs in 30 Days</a><br><a class="link" href="https://www.linkedin.com/in/ydinkin/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Yaron Dinkin</a> and <a class="link" href="https://www.linkedin.com/in/eyalkraft/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Eyal Kraft</a> describe how they built an AI agent swarm to automatically reverse engineer and audit Windows kernel drivers at scale. They analyzed 202 high risk drivers and found 521 potential vulnerabilities across 158 unique driver binaries, which after manual triage they believe represents ~100 genuinely exploitable local privilege escalation (LPE) bugs. The experiment costed $600 total, ~$3 per target, $4 per bug 😅</p><p class="paragraph" style="text-align:left;">The five-stage pipeline: </p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Scrape</b> drivers from the MSFT update catalog, OEM sites, and public driver repositories.</p></li><li><p class="paragraph" style="text-align:left;"><b>Preprocess</b> them and identify good targets.</p></li><li><p class="paragraph" style="text-align:left;"><b>Analyze</b> each binary with a council of LLM agents - decompilation agent, attack surface agent identifies functions worth auditing, and a code audit agent inspects each target for memory corruption bugs</p></li><li><p class="paragraph" style="text-align:left;"><b>Virtualize</b> - They created a custom VM-based harness for loading drivers on kernel-debugged Windows machines controlled by agents.</p></li><li><p class="paragraph" style="text-align:left;"><b>Validate</b> - Using the harness, the agents iteratively create Python PoC scripts per finding, effectively performing guided fuzzing until the machine crashes. The BSOD crash dump is then analyzed to confirm the vulnerability triggered correctly.</p></li></ol><p class="paragraph" style="text-align:left;">They manually confirmed and reported 15 vulnerabilities (average CVSS 8.2) to vendors including AMD, Intel, NVIDIA, Dell, Lenovo, and IBM, but after 90+ days only Fujitsu patched and assigned a CVE 🫠 </p><p class="paragraph" style="text-align:left;">“The biggest performance leap was achieved by “closing the loop” and giving the agent direct feedback on exploitation success using our VM-based kernel-debugging harness. Agents that can try to bugcheck the machine over-and-over again are tomorrow’s fuzzers, and <b>with enough compute they’re 100x more dangerous in the wrong hands.”</b></p><p class="paragraph" style="text-align:left;">💡 Giving agents the ability to try a bunch of things and validate the results without human involvement is 🔥 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.philvenables.com/post/things-are-getting-wild-re-tool-everything-for-speed?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Things Are Getting Wild: Re-Tool Everything for Speed</a><br>Last year <a class="link" href="https://linkedin.com/in/philvenables?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Phil Venables</a> had an incrementalist view of the cybersecurity impact of AI, but now believes that it will create a short-term crisis as attackers gain a great advantage but in the long run defenders will win out. <span style="color:rgb(0, 0, 0);">The four major pillars of concern: </span>a massive increase in vulnerabilities from AI-generated code, attackers industrializing exploitation with AI tooling, everything can be faked (content, people, companies), and unpredictable emergent behaviors from trillions of interacting agents.</p><p class="paragraph" style="text-align:left;">However, defenders can leverage their structural advantages (environmental control, specific context, and data access), implement strong baseline controls and continuously monitor them (authentication, segmentation, fast patching, detection/response), leverage AI for vulnerability discovery and auto-remediation, and use defensive agent swarms. Defenders need to prioritize finding and fixing whole classes of vulnerabilities through frameworks and tooling, run their OODA loop faster than attackers, and adopt AI-driven red teaming to iteratively harden defenses.</p><p class="paragraph" style="text-align:left;">💡 XBOW’s <a class="link" href="https://www.linkedin.com/in/oegedemoor/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Oege de Moor</a> also writes about this idea <a class="link" href="https://xbow.com/blog/the-chaos-phase-ai-cybersecurity-threats-2025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">here</a> and <a class="link" href="https://xbow.com/blog/security-in-2026-what-breaks-what-scales-and-what-survives?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">here</a>, calling this the “Chaos Phase,” arguing that in the short term attackers will better operationalize AI / build autonomous hacking tools. “Security programs that hold up under pressure are shifting toward continuous validation. Systems that relentlessly test assumptions, controls, and exposure in the background, without waiting for humans to initiate every action.”</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">Peter J. Liu - <a class="link" href="https://x.com/peterjliu/status/2024901585806225723?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Uncovering Insiders and Alpha on Polymarket with AI</a></p></li><li><p class="paragraph" style="text-align:left;">Latent Space - <a class="link" href="https://www.youtube.com/watch?v=F_1oDPWxpFQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">The AI Frontier: from Gemini 3 Deep Think distilling to Flash — Jeff Dean</a> - Nice, quite technical.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://discuss.ai.google.dev/t/account-restricted-without-warning-google-ai-ultra-oauth-via-openclaw/122778?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Google is nuking accounts using OpenClaw</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/ns123abc/status/2025975943529931240?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Meta’s head of AI safety and alignment gets her emails nuked by OpenClaw​​​​​​​​​​​​​​​​</a> </p></li><li><p class="paragraph" style="text-align:left;">Nikunj Kothari - <a class="link" href="https://x.com/nikunj/article/2022438070092759281?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Token Anxiety</a> - “A friend left a party at 9:30 on a Saturday. Not tired. Not sick. He wanted to get back to his agents.” Overstated, but not totally wrong in my experience 😅 </p></li><li><p class="paragraph" style="text-align:left;">Will Manidis - <a class="link" href="https://x.com/willmanidis/status/2021655191901155534/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Tool Shaped Objects</a> - “We have begun to talk about token consumption the way we talk about capital expenditure: as an input that scales linearly to output. More tokens, more work. Bigger budget, bigger results… The market for feeling productive is orders of magnitude larger than the market for being productive. Most people, most of the time, want to click and watch the number go up. They do not want to be told the number is fake. They will pay— in time, in attention, in actual money— to keep the number going up.”</p><ul><li><p class="paragraph" style="text-align:left;">💡 My view: two things are true- LLMs are able to make people and systems much more productive, <i>and</i> I see people bragging about tokens spent, longest Claude/Codex runs, without connecting that to… outcomes, which is what actually matters.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/88YLe?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Hackers made death threats against this security researcher. Big mistake.</a> - Kim Zetter on Allison Nixon helping arrest dozens of members of The Com. What a story!</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/markgadala/status/2026078762862006747?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Man accidentally gains control of 7,000 robot vacuums</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.geekwire.com/2026/cloud-and-aws-cost-consultant-duckbill-expands-to-software-raises-7-75m-for-new-skyway-platform/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Cloud and AWS cost consultant Duckbill expands to software, raises $7.75M for new Skyway platform</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/wqduTqIGm1g?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">How even in “meritocratic” environment rich kids still have a huge advantage</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/ul7MQcGvSvc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">Alex Hormozi on priorities and sacrifice</a>: “Regrets come when we imagine the upside that we <i>don’t</i> have without taking into account the <i>cost</i> that we didn’t suffer.” “Want less, or trade more.” </p><ul><li><p class="paragraph" style="text-align:left;">Also: “What do you think that you should do, that you’re not doing, that you want me to tell you to do?” 🔥 </p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=7vQgd9RbTIE&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">&#39;KPop Demon Hunters&#39; Creators Break Down Meeting The Saja Boys: &#39;Soda Pop&#39; Lyrics, Animation & More</a></p></li><li><p class="paragraph" style="text-align:left;">Aella - <a class="link" href="https://aella.substack.com/p/people-will-sometimes-just-lie-about?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">People Will Sometimes Just Lie About You</a></p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-317-100-kernel-bugs-in-30-days-secret-scanning-threat-actors-stealing-your-poc" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=ada1892c-e12e-424a-817b-f7c194029208&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #316 - How Trail of Bits uses Claude Code, GitHub Threat Intel, Open Source AI Pentesting Tools</title>
  <description>Extensive guide on being a Claude Code power user, tracking threat actors on GitHub, open source AI-powered pentesting tools</description>
  <link>https://tldrsec.com/p/tldr-sec-316</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-316</guid>
  <pubDate>Thu, 19 Feb 2026 15:30:23 +0000</pubDate>
  <atom:published>2026-02-19T15:30:23Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🤖 Come on AI-leen</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Am I pleased with myself that I was able to make the intro title a pun off of AI + this <a class="link" href="https://www.youtube.com/watch?v=6BODDyZRF6A&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">1982 music classic</a>? Absolutely.</p><p class="paragraph" style="text-align:left;">I have a few more #PeakBayArea stories to share. </p><ul><li><p class="paragraph" style="text-align:left;">I “watched” the Super Bowl with the OpenAI Codex team (shout-out Ian). Multiple people were still vibe coding on their laptops throughout.</p></li><li><p class="paragraph" style="text-align:left;">I attended an event hosted by several AI video generation companies, and they played a few AI-generated shorts that were quite impressive. </p><ul><li><p class="paragraph" style="text-align:left;">One thing I find exciting about these tools is that great storytellers can now create shorts and even movies that would have taken dozens to hundreds of people and costed millions previously. </p></li><li><p class="paragraph" style="text-align:left;">I see this same trend with AI in coding and other domains: the top performers are becoming even more leveraged.</p></li><li><p class="paragraph" style="text-align:left;">Sidenote: it was easy to immediately tell if an attendee was a creative or normal tech worker as they dressed very visibly differently 😂 </p></li></ul></li><li><p class="paragraph" style="text-align:left;">I attended a Lunar New Years party (shout-out Grace) during which someone did some crowd work for a video, “When I say ‘A’, you say ‘I’, ‘A’… (everyone) ‘I’… ‘A&#39;… ‘I’.</p></li></ul><p class="paragraph" style="text-align:left;">You know, just normal party stuff 😂 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><b>P.S</b> Semgrep is doing a <a class="link" href="https://semgrep.dev/events/semgrep-secure-2026-virtual-keynote/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">live keynote</a> next week of some things we’ve been cooking. </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;"><b> </b><span style="color:rgb(15, 20, 25);"><b> </b></span>🔑<span style="color:rgb(15, 20, 25);"><b>☁️ </b></span><b>Your AWS Keys Have Leaked -</b><br><b>Now What?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Long-lived AWS keys are a major security liability, often hiding in plain sight within source code and build artifacts. Join <a class="link" href="https://www.linkedin.com/in/josephwleon/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Joseph Leon</a> (Truffle Security) and guest expert <a class="link" href="https://www.linkedin.com/in/eduard-k-agavriloae/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Eduard Agavriloae</a> to break down:</p><ul><li><p class="paragraph" style="text-align:left;">Exploitation: How attackers find and use leaked keys.</p></li><li><p class="paragraph" style="text-align:left;">Triage: Critical immediate steps after a leak.</p></li><li><p class="paragraph" style="text-align:left;">Prevention: Shifting to short-lived, identity-based roles.</p></li></ul><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://trufflesecurity.com/webinars/where-are-your-aws-keys-hiding?utm_source=tldrsec&utm_medium=email&utm_campaign=webinar" target="_blank" rel="noopener noreferrer nofollow"><b>Watch Webinar</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">I’m a fan of Truffle and Eduard’s research, they’ve been featured a lot in <i>tl;dr sec</i>. This should be a practical, useful webinar 👍️ </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><a class="link" href="https://words.filippo.io/passkey-encryption/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Encrypting files with passkeys and age</a><br><a class="link" href="https://bsky.app/profile/filippo.abyssdomain.expert?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Filippo Valsorda</a> describes <a class="link" href="https://github.com/FiloSottile/typage?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Typage</a>, a TypeScript implementation of the age file encryption format that supports symmetric encryption with passkeys and other WebAuthn credentials in browsers. To learn more about passkeys and WebAuthn, Filippo highly recommends Adam Langley’s <a class="link" href="https://www.imperialviolet.org/tourofwebauthn/tourofwebauthn.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">A Tour of WebAuthn</a><i>.</i></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://engineering.mercari.com/en/blog/entry/20251106-mercari-phishing-resistant-accounts-with-passkey?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Mercari’s Phishing-Resistant Accounts with Passkey</a><br><a class="link" href="https://www.linkedin.com/in/tatsuya-karino-85779a40/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Karino Tatsuya</a> describes Mercari&#39;s journey from offering passkeys as an alternative authentication method to creating fully phishing-resistant &quot;passkey accounts&quot; that completely disable password and SMS OTP authentication. Mercari improved the recovery experience using Japan&#39;s MyNumber digital ID card for high-assurance identity proofing, allowing self-service recovery without compromising security, and implemented risk-based requirements for different services to drive adoption. Their approach has resulted in 10.9 million passkey accounts (approximately half of monthly active users), with passkey authentication expected to surpass password authentication next year.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://bughunters.google.com/blog/passkeys?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">A Beginners Guide: Cross-Device Passkeys</a><br>Google’s <a class="link" href="https://www.linkedin.com/in/harshlal028/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Harsh Lal</a> describes Hybrid transport, which enables cross-device passkey authentication when users need to sign in on devices where their passkey isn&#39;t stored, such as public terminals or shared computers. The flow works by having the client device display a QR code containing a FIDO URI with a session identifier, which the authenticator device (e.g. smartphone) scans to establish an end-to-end encrypted tunnel over the internet, while Bluetooth Low Energy performs a proximity check to confirm physical presence and prevent man-in-the-middle attacks. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The authenticator uses its private key (which never leaves the device) to sign a cryptographic challenge from the server, transmitting only the signature back through the encrypted tunnel for verification. This approach maintains passkeys&#39; phishing resistance while solving the key adoption challenge of accessing accounts across different devices and operating systems without exposing credentials on shared machines.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Over-Privileged AI Systems Drive 4.5x Higher Incident Rates</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">New research surveying 205 CISOs reveals a stark reality: 92% of orgs are deploying AI into production, but 67% still rely on static credentials. The result? Organizations with over-privileged AI systems report 76% incident rates vs. just 17% for those enforcing least privilege. Identity fragmentation + AI agents = exponentially larger blast radius.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://goteleport.com/resources/surveys/infrastructure-identity-survey-2026/?utm_campaign=AI&utm_content=webpage&utm_medium=partner&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>Read the 2026 AI Security Report</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Least privilege and identity for AI agents/systems are quite important, I’m curious to see what they found 👀 </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.plerion.com/blog/testing-access-to-aws-resources?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Testing Access to AWS Resources Without Angering the People That Pay the Bills</a><br>Plerion’s <a class="link" href="https://linkedin.com/in/danielgrzelak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Daniel Grzelak</a> presents a methodology for safely testing AWS resource access permissions without reading sensitive data or changing state. Daniel outlines four core techniques: comparing unsigned vs signed requests (public SQS queues accept unauthenticated requests), metadata read APIs, executing no-op operations (UntagResource with nonexistent tags), and crafting malformed requests that pass authorization but fail validation (SNS Publish with an empty message). The post describes a “3-topic method” for determining when a malformed request actually proves authorization by testing against allowed, denied, and nonexistent resources to confirm authorization checks occur before validation.</p><p class="paragraph" style="text-align:left;">Plerion has also released <a class="link" href="https://github.com/plerionhq/sns-buster?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">sns-buster</a>, an open-source tool that automates testing 14 SNS API actions with 30+ parameter mutations per action to empirically verify topic exposure.</p><p class="paragraph" style="text-align:left;">💡 A pretty clever approach for “checking facts” about an environment in a thoughtfully minimally intrusive way 👍️ </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://permiso.io/blog/can-an-ai-agent-run-a-purple-team-exercise?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Can an AI Agent Run a Purple Team Exercise?</a><br><a class="link" href="https://linkedin.com/company/permiso-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Permiso</a> describes deploying their AI agent, Rufio, to emulate Scattered Spider tactics against an AWS environment and validate their detection coverage. Originally they built Rufio to detect malicious OpenClaw skills, and over 12 days it wrote 135 YARA rules, scanned &gt;2,500 skills across markplaces, confirmed 21 threats, and built 16 custom skills. </p><p class="paragraph" style="text-align:left;">In this post, given a blog post describing Scattered Spider TTPs, Rufio had to understand the AWS Management Console and CLI patterns required to execute each step, then translate the blog post&#39;s tactical description into actual API calls and console interactions. Rufio autonomously created an IAM user (LUCR-3-operator), attached AdministratorAccess, generated access keys, attempted to enable EC2 serial console, and harvested CloudShell credentials.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Doing this exercise, they found an instruction-following gap where Rufio failed to switch from the federated Okta session to the newly-created IAM credentials for subsequent actions, despite being explicitly told to do so.</p></div><p class="paragraph" style="text-align:left;">💡 This is cool: given a public description of a threat actor’s TTPs or a breach report, automatically have an agent follow the same path → test your detections or even create new ones. It’s not perfect today, but Agents will continue to get better at following instructions and not getting lost. </p><p class="paragraph" style="text-align:left;">I’m imagining a future where this approach converges to an almost “herd immunity” type thing where one company publishes a threat actor’s TTPs or unique attack flows, then blue teams everywhere essentially can auto test “would I detect this in my environment?” and then auto-enable the relevant logs, tune detections, etc. That’d be rad.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/safedep/pmg?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">safedep/pmg</a><br>By <a class="link" href="https://www.linkedin.com/company/safedep/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">SafeDep</a>: Package Manager Guard (PMG) acts as a security middleware layer, wrapping your package manager to analyze packages for malware before they are installed, sandboxing the installation process to prevent system modification, and auditing every package installation event.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/AikidoSec/safe-chain?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">AikidoSec/safe-chain</a><br>By <a class="link" href="https://www.linkedin.com/company/aikido-security/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Aikido</a>: A lightweight proxy server that intercepts package downloads from the npm registry and PyPI to protect against malicious code (verifies packages against Aikido’s open source threat intel database). Blocks packages newer than 24 hours.</p><p class="paragraph" style="text-align:left;">💡 See also Socket’s <a class="link" href="https://github.com/SocketDev/sfw-free?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">firewall</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://speakerdeck.com/ramimac/the-forensic-trail-on-github-hunting-for-supply-chain-activity?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">The Forensic Trail On GitHub: Hunting For Supply Chain Activity</a><br>Slides for Wiz’s <a class="link" href="https://linkedin.com/in/ramimac?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a> and <a class="link" href="https://linkedin.com/in/amitaico?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Amitai Cohen</a>’s BlackHat EU 2025 talk covering a methodology for investigating and tracking real-world supply chain attacks exploiting GitHub Actions. The talk describes useful threat intelligence available directly from both GitHub and Git, and includes demos of how to effectively pivot on user metadata and behavioral heuristics, uncover attacker forks, and recover deleted gists and commits. They also demonstrate how to trace attacker aliases, identify targets of reconnaissance, and unmask attackers and researchers in real-time.</p><p class="paragraph" style="text-align:left;">See also <a class="link" href="https://github.com/wiz-sec-public/GitHunt?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">GitHunt</a>, their accompanying GitHub repo with three demos: a Flask web app showing a demo of identifying and investigating an attack based off the public GH firehose, a CLI tool for investigating GitHub activity, and a toy tool that identifies suspicious GitHub activity, enriches it, and renders it for further investigation.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://labs.boostsecurity.io/articles/unveiling-bagel-why-your-developers-laptop-is-the-softest-target-in-your-supply-chain?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Unveiling Bagel: Why Your Developer&#39;s Laptop is the Softest Target in Your Supply Chain</a><br>Boost Security’s <a class="link" href="https://www.linkedin.com/in/alexis-maurer-fortin-8b9267a6/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Alexis-Maurer Fortin</a> announces the release of <a class="link" href="https://github.com/boostsecurityio/bagel?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">bagel</a>, an open-source CLI that inventories security-relevant metadata on developer workstations including credentials, misconfigurations, and exposed secrets across Git, SSH, NPM, cloud providers (AWS/GCP/Azure), GitHub CLI, and IDE configurations. Bagel works in a privacy-focused way, only reporting secret locations, types, and SHA-256 fingerprints, not actual values. Bagel also scans for configuration weaknesses (like disabled SSL verification in Git/NPM, SSH config settings, etc.), secrets in environment variables, and shell history, and active sessions (active GitHub CLI sessions, cached cloud provider tokens, SSH agent state).</p><p class="paragraph" style="text-align:left;">💡 The post makes a great point- developers generally have a variety of types of privileged access (often directly or indirectly production-level access), but this access isn’t monitored as well as say CI environments that have similar levels of secrets. By inventorying what secrets live where, you can get a feel for your exposure in the face of a Shai-Hulud type supply chain attack.</p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/rex-rs/rex?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">rex-rs/rex</a><br>A kernel extension framework that lets you write eBPF-style programs in safe Rust that compile directly to native code, bypassing the in-kernel eBPF verifier and its complexity constraints. By leveraging Rust&#39;s safety guarantees instead of static verification, Rex eliminates common eBPF pain points like program complexity limits, verifier-unfriendly compiler output, and counter-intuitive code patterns.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/Matmaus/LnkParse3?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Matmaus/LnkParse3</a><br>A Python tool for parsing Windows shortcut (.LNK) files, handling malformed files gracefully.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wietzebeukema.nl/blog/trust-me-im-a-shortcut?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Trust Me, I’m a Shortcut</a><br><a class="link" href="https://x.com/wietze?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Wietze</a> discusses five Windows LNK file spoofing techniques that allow attackers to hide malicious targets and command-line arguments from Explorer&#39;s Properties dialog. Wietze has released <a class="link" href="https://github.com/wietze/lnk-it-up?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">lnk-it-up</a>, an open-source toolkit containing lnk-generator (creates malicious LNKs using these variants) and lnk-tester (identifies deceptive LNKs by using Windows APIs to detect mismatches between displayed and actual targets). </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The variants: padding command-line args with whitespace to hide them beyond the 256-char display limit, using HasExpString flag with null EnvironmentVariableDataBlock to hide arguments, setting invalid paths in EnvironmentVariableDataBlock to spoof targets while executing LinkTargetIDList, exploiting non-conforming LinkTargetIDList with LinkInfo fallback, and the most powerful variant, populating only TargetAnsi while leaving TargetUnicode null to completely spoof targets and hide arguments.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“In summary, we have seen that LNK files are unpredictable because crucial pieces of information might be hidden or entirely spoofed, meaning it is not straightforward to anticipate what will happen when an LNK file is opened.”</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://security.googleblog.com/2023/05/introducing-new-way-to-buzz-for-ebpf.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Introducing a new way to buzz for eBPF vulnerabilities</a><br>(2023) Google’s <a class="link" href="https://www.linkedin.com/in/jjlopezjaimez/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Juan José López Jaimez</a> and <a class="link" href="https://www.linkedin.com/in/meador-inge-a1419a6/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Meador Inge</a> announce <a class="link" href="http://github.com/google/buzzer?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Buzzer</a>, a new eBPF fuzzing framework that aims to help hardening the Linux Kernel. Buzzer aims to detect errors in the eBPF verifier (which verifies that an eBPF program satisfies various safety rules) by generating many eBPF programs, and if the verifier thinks it is safe, executing the program in a running kernel to determine if it is actually safe. Runtime behavior errors are detected through instrumentation code added by Buzzer.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools</a><br><a class="link" href="https://x.com/MatheuzSecurity?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">MatheuZ</a> demonstrates how an attacker with kernel module loading capability can systematically blind eBPF-based security tools (Falco, Tracee, GhostScan, Decloaker) by hooking kernel functions via ftrace rather than attacking the eBPF programs themselves. Testing showed complete evasion: Falco missed reverse shells, file modifications to /etc/passwd and /etc/shadow, and privilege escalation; Tracee&#39;s process enumeration and syscall tracing showed nothing; and iterator-based tools like GhostScan and Decloaker failed to detect hidden processes or network connections. </p><p class="paragraph" style="text-align:left;">Core insight: once an attacker controls the kernel (via loaded modules when Secure Boot is disabled), they control the kernel→userspace data delivery mechanisms that eBPF tools depend on, making observability optional regardless of how correctly the eBPF programs execute.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/claude-code-config?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">trailofbits/claude-code-config</a> - Opinionated defaults, documentation, and workflows for Claude Code at Trail of Bits. Covers sandboxing, permissions, hooks, skills, MCP servers, and usage patterns they’ve found effective across security audits, development, and research.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/skills-curated?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">trailofbits/skills-curated</a> - Trail of Bits&#39; reviewed and approved Claude Code plugins. Every skill and marketplace here has been vetted for quality and safety.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/KeygraphHQ/shannon?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">KeygraphHQ/shannon</a><br>An autonomous AI pentester that actively exploits web application vulnerabilities rather than just identifying them. Shannon uses its built-in browser to execute real exploits, such as injection attacks, and auth bypass, to prove the vulnerability is actually exploitable. It combines white-box source code analysis with black-box dynamic exploitation across four phases (reconnaissance, vulnerability analysis, exploitation, and reporting). Shannon achieved a 96% success rate on the hint-free XBOW Benchmark.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/samugit83/redamon?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">samugit83/redamon</a><br>By <a class="link" href="https://www.linkedin.com/in/samuele-giampieri-b1b67597/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Samuele Giampieri</a>: An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitation. RedAmon is a LangGraph-based ReAct agent that chains together a six-phase reconnaissance pipeline: subdomain discovery, port scanning with Naabu, HTTP probing with httpx, resource enumeration with Katana/GAU/Kiterunner, and vulnerability scanning with Nuclei, and MITRE enrichment and GitHub secret hunting into a Neo4j knowledge graph.</p><p class="paragraph" style="text-align:left;">The AI agent orchestrator operates in three phases: informational (graph queries and web searches), exploitation (CVE-based exploits or credential brute-forcing with user approval), and post-exploitation (Meterpreter sessions or stateless command execution), with all successful compromises automatically recorded as Exploit nodes in the graph, linked to the target IP, CVE, and port. <a class="link" href="https://www.youtube.com/watch?v=mO5CCkYlY94&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Video tutorial</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://1password.com/blog/ai-agent-security-benchmark?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">1Password&#39;s new benchmark teaches AI agents how not to get scammed</a><br><a class="link" href="https://www.linkedin.com/in/jason-meller-04498230/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Jason Meller</a> describes how 1Password built SCAM (Security Comprehension and Awareness Measure), an open-source benchmark testing whether AI agents can avoid phishing and credential theft when performing real tasks like reading emails and filling passwords. They tested eight models (Claude Opus 4.6, Sonnet 4, Haiku 4.5, GPT-5.2, GPT-4.1, GPT-4.1 Mini, Gemini 3 Flash, Gemini 2.5 Flash) across 30 scenarios and found baseline safety scores ranging from 35% (Gemini 2.5 Flash) to 92% (Claude Opus 4.6), with every model committing critical failures like typing real passwords into phishing pages or forwarding emails containing embedded credentials. </p><p class="paragraph" style="text-align:left;">They then added a 1,200-word security Skill file that’s essentially like security awareness training but for models (advises them to analyze domains right-to-left, read content before sharing, etc.) and found it dramatically improved results, reducing total critical failures from 287 to 10 across all runs. The benchmark, skill file, testing framework, and all results are available on <a class="link" href="https://github.com/1Password/SCAM?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>. Nice project overview and agent trace videos on the project <a class="link" href="https://1password.github.io/SCAM/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">landing page</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/introducing-ai-cyber-model-arena-a-real-world-benchmark-for-ai-agents-in-cybersec?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Introducing AI Cyber Model Arena: A Real-World Benchmark for AI Agents in Cybersecurity</a><br>Matan Vetzler, <a class="link" href="https://www.linkedin.com/feed/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools#" target="_blank" rel="noopener noreferrer nofollow">Nir Ohfeld</a>, and <a class="link" href="https://www.linkedin.com/feed/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools#" target="_blank" rel="noopener noreferrer nofollow">Alon Schindel</a> announce Wiz’s AI Cyber Model Arena, which benchmarks offensive AI security on 257 real-world challenges (zero-days, CVEs, API/web, and cloud across AWS/Azure/GCP/K8s), demonstrating what AI models and agents can really do. They evaluated 25 agent-model combinations (4 agents × 8 models) across offensive security challenges. Currently, the top performers are: Claude Opus 4.6 with Claude Code and then Gemini 3 Pro with Gemini CLI. It doesn&#39;t look like they&#39;ve tested GPT-5.3-Codex yet (probably due to it not being available through the API). <a class="link" href="https://www.wiz.io/cyber-model-arena?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Arena landing page</a>.</p><p class="paragraph" style="text-align:left;">Methodology:</p><ul><li><p class="paragraph" style="text-align:left;">Each agent-model-challenge combination is run 3 times (pass@3).</p></li><li><p class="paragraph" style="text-align:left;">Agents run in isolated Docker containers with no internet access, no CVE databases, and no external resources — the agent cannot browse the web, install packages, or access any information beyond what is in the container.</p></li><li><p class="paragraph" style="text-align:left;">All scoring is deterministic (no LLM-as-judge).</p></li></ul><p class="paragraph" style="text-align:left;">💡It’s nice to see more benchmarks measuring AI agent capabilities on offensive security tasks. Overall it seems thoughtfully designed, and I like that they measured a number of agent + model combinations. It’d be cool if they open sourced the benchmark 👀</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://steipete.me/posts/2026/openclaw?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">OpenClaw, OpenAI and the future</a> - OpenClaw creator Peter Steinberger will be joining OpenAI, OpenClaw will move to a foundation.</p></li><li><p class="paragraph" style="text-align:left;">Y Combinator - <a class="link" href="https://www.youtube.com/watch?v=PQU9o_5rHC4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Inside Claude Code With Its Creator Boris Cherny</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/arscontexta/status/2023957499183829467?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Skill Graphs &gt; SKILL.md</a></p></li><li><p class="paragraph" style="text-align:left;">Snyk’s Austin Martin describes building their <a class="link" href="https://www.linkedin.com/posts/austinrmartin_snyk-revenueoperations-ai-activity-7426995884741111808-laVW/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">AI-powered churn detection/prevention system</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.blog/ai-and-ml/automate-repository-tasks-with-github-agentic-workflows?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Automate repository tasks with GitHub Agentic Workflows</a> - GitHub introduces <a class="link" href="https://github.github.io/gh-aw/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Agentic Workflows</a>, a technical preview that lets you define repository automation tasks in plain Markdown frontmatter plus natural language instructions, which then execute via coding agents (Copilot CLI, Claude Code, or OpenAI Codex) within GitHub Actions. Example use cases: continuously triage issues (summarize, label), documentation updates, test improvement, and investigate CI failures.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.github.com/gh-aw/blog/2026-01-12-welcome-to-pelis-agent-factory?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Peli’s Agent Factory</a> - A collection of over 100 automated agentic workflows GitHub has built across triaging issues, continuously simplifying or refactoring code, burning down the backlog, and more.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI + Burnout</p><ul><li><p class="paragraph" style="text-align:left;">HBR - <a class="link" href="https://hbr.org/2026/02/ai-doesnt-reduce-work-it-intensifies-it?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">AI Doesn’t Reduce Work-It Intensifies It</a> - An eight-month study at a 200-employee tech company found that AI adoption led to work intensification rather than reduction, in three main ways: task expansion (product managers writing code, researchers doing engineering work), blurred work-life boundaries (prompting AI during breaks and off-hours), and increased multitasking (managing multiple AI agents in parallel). While workers felt more productive, they reported being busier than before.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://steve-yegge.medium.com/the-ai-vampire-eda6e4f07163?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">The AI Vampire</a> - Steve Yegge warns that AI coding tools like Claude Code are creating a &quot;vampire effect&quot; where devs realize they can be 10x as productive → output standards raise which leads to burnout → companies capture value through overwork rather than sharing benefits with employees.</p><ul><li><p class="paragraph" style="text-align:left;">“The world is accelerating, against its will. I can feel it; I grew up in the 1980s, when time really did move more slowly, in the sense that news and events were spaced way out, and society had time to reflect on them. Now it changes so fast we can’t even keep up, let alone reflect.”</p></li><li><p class="paragraph" style="text-align:left;">“If you have joined an AI-native startup, the founders and investors are using the VC system to extract value from you, today, with the glimmer of hope for big returns for you all later.” </p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;">Charles Cornell - <a class="link" href="https://www.youtube.com/watch?v=gh20tavQqxk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">What&#39;s Even The Point Anymore? ...The AI Takeover of Music</a></p></li><li><p class="paragraph" style="text-align:left;">Stripe - <a class="link" href="https://www.youtube.com/watch?v=oUSWtLu2RCE&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Ben Thompson from Stratechery on AI ads, the end of SaaS, and the future of media</a></p></li><li><p class="paragraph" style="text-align:left;">Tim Ferriss - <a class="link" href="https://www.youtube.com/watch?v=rjSesMsQTxk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Bill Gurley — The AI Era, 10 Days in China, & Life Lessons from Bob Dylan, Jerry Seinfeld,, and More</a></p></li><li><p class="paragraph" style="text-align:left;">Fogus - <a class="link" href="https://blog.fogus.me/2025/12/23/the-best-things-and-stuff-of-2025.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">The Best Things and Stuff of 2025</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.acquisition.com/hubfs/Screenshot%202025-12-14%20at%202.56.08%20PM.png?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Are you ok? No but…</a></p></li><li><p class="paragraph" style="text-align:left;">Tynan - <a class="link" href="https://tynan.com/gear2026/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Gear Post 2026</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=RDyg_41QF1w&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Ed Sheeran on 10,000 hour rule and advice for musicians starting out</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/OJ1MJ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Handsome at Any Cost</a> - Braden Peters, known as Clavicular, has emerged as a beacon for a group of narcissistic, status-obsessed young men. He wants to take his fixation with “looksmaxxing” mainstream.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/romanhelmetguy/status/2022894576273625517?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Roman Helmet Guy</a> - You can’t solve a courage problem with more intelligence.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=kpJLNBZhTYA&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Pete Davidson represents a sock brand on Shark Tank</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://giangalang.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Gian Galang</a> - Portfolio for an an award-winning artist and illustrator living. Some cool stylized fighters.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cje.io/2026/02/11/next-things/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">Casey Ellis steps away from Bugcrowd after 13 years</a> - Casey is a good dude and friend of the newsletter. Glad he’s getting a chance to rest a bit.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-316-how-trail-of-bits-uses-claude-code-github-threat-intel-open-source-ai-pentesting-tools" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=10cf4056-d4ea-47b5-bd5f-0e61593b3ce2&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #315 - Securing OpenClaw, Top 10 Web Hacking Techniques of 2025, Discovering Negative-Days with LLMs</title>
  <description>Minimal OpenClaw alternatives, scanning tools, and hardening guidance, PortSwigger&#39;s curated top web hacking techniques, open source GitHub Action to flag commits fixing vulnerabilities before they get a CVE </description>
  <link>https://tldrsec.com/p/tldr-sec-315</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-315</guid>
  <pubDate>Thu, 12 Feb 2026 15:30:24 +0000</pubDate>
  <atom:published>2026-02-12T15:30:24Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">📺️ AI for Security Engineers (with Cursor&#39;s Security Lead)</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">AI is helping developers ship faster than ever. How can security keep up? </p><p class="paragraph" style="text-align:left;">I&#39;m stoked for my upcoming chat with my friend <a class="link" href="https://www.linkedin.com/in/travismcpeak/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Travis McPeak</a>, <b>Security Lead</b> at <b>Cursor</b>, about how security engineers can use coding agents to become even more leveraged.</p><p class="paragraph" style="text-align:left;">Cursor has been one of the fastest growing and shipping AI-forward companies right now, so I thought it’d be great to hear from someone on the front lines.</p><p class="paragraph" style="text-align:left;">I’ve actually known Travis and been a fan of his work for years, when he was doing cool stuff as the AppSec engineering manager at Netflix, then Head of Product Security at Databricks, then co-founder of Resourcely.<br><br>We&#39;ll discuss in the webinar:</p><ul><li><p class="paragraph" style="text-align:left;">How modern coding agents change what projects are feasible for security engineers.</p></li><li><p class="paragraph" style="text-align:left;">The impact of coding agents on secure defaults and building a “paved road.”</p></li><li><p class="paragraph" style="text-align:left;">Using AI to rapidly ramp up on new code bases and tech domains.</p></li><li><p class="paragraph" style="text-align:left;">Automating cloud security.</p></li><li><p class="paragraph" style="text-align:left;">Building (and owning in production) security controls, without hurting developer experience.</p></li><li><p class="paragraph" style="text-align:left;">Getting broad and continuous visibility into security-relevant code changes.</p></li><li><p class="paragraph" style="text-align:left;">Where AI is headed, and what it means for you and your role.</p></li></ul><p class="paragraph" style="text-align:left;">We’ll leave plenty of time for questions, so you can ask Travis and I about whatever is most immediately pressing and useful to you.</p><p class="paragraph" style="text-align:left;"><b>When</b>: (next week) February 19th, 10am PST.</p><p class="paragraph" style="text-align:left;">Hope to see you there!</p><h2 class="heading" style="text-align:center;">👉️ <a class="link" href="https://semgrep.dev/events/ai-for-security-engineers-with-cursors-security-lead/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Join us: AI for Security Engineers</a> 👈️ </h2><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> 2026 State of Identity Security Report</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Attackers are already logged in before access risk is fully understood, and the biggest delay in response isn’t alerts, it’s confidence.</p><p class="paragraph" style="text-align:left;">New data from 500+ security teams shows:</p><ul><li><p class="paragraph" style="text-align:left;">Identity-based access is the most common path into cloud environments</p></li><li><p class="paragraph" style="text-align:left;">Teams often detect activity but lack context to assess risk pre-incident</p></li><li><p class="paragraph" style="text-align:left;">Non-human identities and AI agents drive blast radius through long-lived, over-privileged credentials</p></li></ul><p class="paragraph" style="text-align:left;">The State of Identity Security Report 2026 breaks down where identity visibility fails and what helps teams scope and contain incidents faster.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://hero.permiso.io/state-of-identity-security-2026/?utm_source=tldrsec&utm_medium=sponsored&utm_campaign=state-of-report-2026&utm_content=newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Get the Report</b></a> <b>👈</b></h2></div><p class="paragraph" style="text-align:left;">500+ security teams is a lot 🤯 I knew identity was important, but wow: “76% of organizations say <i>identity compromise</i> accounts for up to 75% of security incidents.”</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=ETB2w-f3pM4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Lost in Translation: Exploiting Unicode Normalization</a> by <a class="link" href="https://www.linkedin.com/in/ryancbarnett/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Ryan Barnett</a> and <a class="link" href="https://www.linkedin.com/in/isabellabarnett/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Isabella Barnett</a> (So cool to have a family co-presenting team 🤩, love it)</p></li><li><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://arcjet.com/?utm_source=tldrsec&utm_medium=email&utm_campaign=2026-02-12" target="_blank" rel="noopener noreferrer nofollow">The security platform that ships with your code</a></b><b> </b>— Arcjet helps teams protect APIs and applications using in-code security like rate limiting, bot protection, and request validation. No proxies, test locally, everything in code.*</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=Dq_KVLXzxH8&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Parser Differentials: When Interpretation Becomes a Vulnerability</a> by <a class="link" href="https://www.linkedin.com/in/joern-schneeweisz-b5a4511b1/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Joern Schneeweisz</a></p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Top 10 web hacking techniques of 2025</a><br>PortSwigger’s <a class="link" href="https://www.linkedin.com/in/james-kettle-albinowax/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">James Kettle</a> announces the top 10 web hacking techniques of 2025, selected from 63 community nominations through voting and expert panel review. Some 🔥 research, well worth reading as always.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">By <a class="link" href="https://github.com/vladko312?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Vladislav Korchagin</a>: <a class="link" href="https://github.com/vladko312/Research_Successful_Errors?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Successful Errors: New Code Injection and SSTI Techniques</a> introduces new error-based techniques for exploiting blind server-side template injection. Includes novel polyglot-based detection techniques.</p></li><li><p class="paragraph" style="text-align:left;">By <a class="link" href="https://www.linkedin.com/in/alex-brown-581075172/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Alex Brown</a>: <a class="link" href="https://www.elttam.com/blog/leaking-more-than-you-joined-for/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">ORM Leaking More Than You Joined For</a> evolves ORM leaks from a niche, framework-specific vulnerability into a generic methodology for exploiting search and filtering capabilities.</p></li><li><p class="paragraph" style="text-align:left;">By <a class="link" href="https://www.linkedin.com/in/shubhamshah/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Shubham Shah</a>: <a class="link" href="https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Novel SSRF Technique Involving HTTP Redirect Loops</a> - A technique for making blind SSRF visible.</p></li></ol><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/ambionics/phpggc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">ambionics/phpggc</a><br>A library of PHP unserialize() payloads along with a tool to generate them. It supports 15+ frameworks including Laravel, Symfony, Drupal, and Monolog, with gadget chains for RCE, file read/write, and other exploitation primitives.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.philvenables.com/post/the-ciso-s-craft-watchmaker-or-gardener?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">The CISO&#39;s Craft: Watchmaker or Gardener?</a><br><a class="link" href="https://www.linkedin.com/in/philvenables/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Phil Venables</a> contrasts two CISO leadership philosophies: the &quot;Watchmaker&quot; emphasizes precision, command-and-control, detailed policies, and centralized tools for predictable security but risks rigidity and burnout; and the &quot;Gardener,&quot; which focuses on cultivating security culture, empowering teams with principles and guardrails, and building adaptive resilience but may appear less structured. Modern CISOs should blend both.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> AI is speeding up attacks—can your AppSec keep up?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">New research highlights a harsh reality for AppSec: 54% of orgs saw incidents in their own apps, and half take 1–7 days to fix critical issues. Attackers do not wait and AI‑driven threats move faster than teams can respond. Omdia explains why Application Security Posture Management (ASPM) is becoming essential for cutting alert noise, taming tool sprawl, and keeping security in step with modern delivery speed.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><b><a class="link" href="https://start.paloaltonetworks.com/omdia-appsec-research-2026?utm_source=tldrSEC&utm_mediu[…]L2-BSAP-AppSec&utm_content=Omdia-appsec-research-report" target="_blank" rel="noopener noreferrer nofollow">Read the Omdia Report</a></b><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Attackers are definitely moving faster (see the AI + Security section). Streamlined fixes and quickly prioritizing the right things seems like it’s going to be more and more important.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/awesome-foundation/aws-config-d?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">awesome-foundation/aws-config-d</a><br>By <a class="link" href="https://www.linkedin.com/in/lukakladaric/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Luka Kladarić</a>: Manage multiple AWS SSO organizations with separate config files. Split <code>~/.aws/config</code> into one file per organization. Concatenate on shell start. No dependencies.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://specterops.io/blog/2026/01/30/weaponizing-whitelists-an-azure-blob-storage-mythic-c2-profile?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Weaponizing Whitelists: An Azure Blob Storage Mythic C2 Profile</a><br>SpecterOps’ <a class="link" href="https://www.linkedin.com/in/gomez742/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Andrew Gomez</a> and <a class="link" href="https://www.linkedin.com/in/allendemoura/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Allen DeMoura</a> announce <a class="link" href="https://github.com/senderend/azureBlob?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">azureBlob</a>, a new Mythic C2 profile that leverages Azure Blob Storage for command and control, exploiting common firewall exceptions like <code>*.blob.core.windows.net</code> found in deployment guides from vendors like Citrix, Parallels, and Nerdio.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.sysdig.com/blog/ai-assisted-cloud-intrusion-achieves-admin-access-in-8-minutes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">AI-assisted cloud intrusion achieves admin access in 8 minutes</a><br>Sysdig’s <a class="link" href="https://www.linkedin.com/in/alessandro-brucato/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Alessandro Brucato</a> and <a class="link" href="https://www.linkedin.com/in/michaelclarkinpa/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Michael Clark</a> observed where a threat actor escalated from stolen credentials to admin access in under 10 minutes, with strong indicators of LLM-assisted operations including Serbian-commented code, hallucinated GitHub repos, and fake AWS account IDs. The threat actor gained initial access to the victim&#39;s AWS account through credentials discovered in public S3 buckets, escalated privileges through Lambda function code injection, moved laterally across 19 unique AWS principals, abused Amazon Bedrock for LLMjacking, and launched GPU instances for model training. “The affected S3 buckets were named using common AI tool naming conventions, which the attackers actively searched for during reconnaissance.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://unit42.paloaltonetworks.com/tracking-threat-groups-through-cloud-logging?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Novel Technique to Detect Cloud Threat Actor Operations</a><br>Palo Alto Networks’ <a class="link" href="https://www.linkedin.com/in/qquist/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Nathaniel Quist</a> describes a detection method that identifies threat actors by mapping cloud security alerts to MITRE ATT&CK techniques, successfully distinguishing between Muddled Libra (cybercrime group using social engineering and ransomware) and Silk Typhoon (China-nexus APT exploiting Exchange servers and VPNs) based on their unique &quot;fingerprints.&quot; The analysis across 22 industries from June 2024-June 2025 found Muddled Libra triggered nearly 70 unique alert types (focused on Azure Graph API enumeration and Microsoft 365 exfiltration) with only 3 overlapping with Silk Typhoon&#39;s 50+ alert types (focused on automated collection and data destruction).</p><p class="paragraph" style="text-align:left;">The takeaway: tracking unique alert variety (breadth of techniques) versus average daily alert volume (operational persistence) can enable proactive threat hunting.</p><p class="paragraph" style="text-align:left;">💡 I wonder if any threat actors read reports like this about other threat actor groups and think, “Huh nice, good point, yeah I should do more of what they’re doing, I’m missing out.”</p><p class="paragraph" style="text-align:left;"></p></div><div id="ai-security" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/qwibitai/nanoclaw?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">qwibitai/nanoclaw</a> - A lightweight alternative to Clawdbot / OpenClaw that runs Agents in containers (supports Linux and macOS containers) for security. Connects to WhatsApp, has memory, scheduled jobs, and runs directly on Anthropic&#39;s Agents SDK.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/HKUDS/nanobot?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">HKUDS/nanobot</a> - An ultra-lightweight personal AI assistant inspired by OpenClaw. Core agent functionality is just ~4,000 lines of code, 99% smaller than Clawdbot&#39;s 430k+ lines.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/nearai/ironclaw?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">nearai/ironclaw</a> - An OpenClaw inspired implementation in Rust focused on privacy and security. Untrusted tools run in isolated WebAssembly containers with capability-based permissions. Secrets are never exposed to tools; injected at the host boundary with leak detection. Endpoint allowlisting.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/owocki/status/2020527594383568936?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">owockibot’s hot wallet private key was compromised after 5 days</a>, his <a class="link" href="https://x.com/owocki/status/2020582101779964054?s=20&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">learning in public GitHub gist was compromised</a>. <a class="link" href="https://x.com/owocki/status/2020905290024268157?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Retrospective</a>.</p></li><li><p class="paragraph" style="text-align:left;">I spent too long on this section and ran out of time for the supply chain, blue/red team sections. Sorry friends 😅 </p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://semgrep.dev/blog/2026/openclaw-security-engineers-cheat-sheet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">OpenClaw Security Engineer&#39;s Cheat Sheet</a><br>Great security guidance overview of OpenClaw by Semgrep’s <a class="link" href="https://www.linkedin.com/in/kurt-boberg-00932664/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Kurt Boberg</a>, covering: thinking about OpenClaw security concerns from first principles, the attack surface, detecting use in your corporate environment (across endpoints, your registry mirror, network indicators), setting up hardened environments to experiment in (sandboxing), security scanning Skills, configuration hardening, incident response, and more. </p><p class="paragraph" style="text-align:left;">💡 Tons of useful tools links, commands to run, hardening recommendations, related work references, and more. I love posts like this tying a bunch of things together 👍️ </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/kappa9999/ClawShield?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">kappa9999/ClawShield</a><br>Security preflight and guardrails for OpenClaw/Moltbot. It checks your config for risky settings, warns you if your gateway is exposed, and helps you keep skills from being tampered with.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/prompt-security/clawsec?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">prompt-security/clawsec</a><br>A complete security skill suite for OpenClaw&#39;s family of agents. Protect your SOUL.md from drift detection, live security recommendations, automated audits, and skill integrity verification. All from one installable suite.</p><p class="paragraph" style="text-align:left;">💡 “Protecting your <code>SOUL.md</code>&quot; was not a phrase I had on my 2026 Bingo card 😂 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/backbay-labs/clawdstrike?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">backbay-labs/clawdstrike</a><br>By <a class="link" href="https://www.linkedin.com/in/connor-whelan/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Connor Whelan</a>: A runtime security enforcement library for AI agents that provides tool-boundary enforcement through 7 built-in guards (path access, network egress, secrets detection, patches validation, tool restrictions, prompt injection, and jailbreaks) with Ed25519-signed receipts proving what was decided under which policy. It has four-layer jailbreak detection (heuristic, statistical, ML, and optional LLM-as-judge), output sanitization with streaming support, and adds low overhead per tool call.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://spaceraccoon.dev/discovering-negative-days-llm-workflows?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Discovering Negative-Days with LLM Workflows</a><br><a class="link" href="https://www.linkedin.com/in/eugene1337/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Eugene Lim</a> describes building a GitHub Action workflow that uses Claude to detect &quot;negative-days&quot; and &quot;never-days&quot; (vulnerabilities patched in open-source projects before they get a CVE) by monitoring repository commits and analyzing them with LLMs. He walks through iterating on the prompt and process: incorporating pull request context via GitHub&#39;s <code>listPullRequestsAssociatedWithCommit</code> API, refining prompts to focus on exploitable vulnerabilities with concrete PoCs, and fixing JSON output issues.</p><p class="paragraph" style="text-align:left;">Eugene open sourced the GitHub Action: <a class="link" href="https://github.com/spaceraccoon/vulnerability-spoiler-alert-action?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">vulnerability-spoiler-alert-action</a> and a live dashboard showing recent findings: <a class="link" href="https://vulnerabilityspoileralert.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">vulnerabilityspoileralert.com</a>.</p><p class="paragraph" style="text-align:left;">💡 Academics have been writing about finding bugs from diffs for probably decades, but what I think is important to note is how relatively straightforward and effective this approach was. In your mental threat model, move “detecting vulnerabilities before they receive CVEs and creating exploits” from “requires nation state resources” to “one person, a few days, a few dollars in LLM costs.” (of course depends on the target)</p><p class="paragraph" style="text-align:left;">The increased rate and ease of finding vulnerabilities (see also below) is going to make being able to rapidly patch software, roll out updates, and ideally solve classes of problems (secure defaults, memory safe languages, sandboxing/capabilities) even more important.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://red.anthropic.com/2026/zero-days?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Evaluating and mitigating the growing risk of LLM-discovered 0-days</a><br>Anthropic’s Nicholas Carlini, <a class="link" href="https://www.linkedin.com/in/keane-lucas/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Keane Lucas</a>, <a class="link" href="https://www.linkedin.com/in/evyatarb/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Evyatar Ben Asher</a> et al describe how Claude Opus 4.6 discovered over 500 high-severity memory corruption vulnerabilities in well-fuzzed open source codebases. How: they put Claude in a VM and gave it access to the latest versions of open source projects, standard utilities (e.g., the standard coreutils or Python) and vulnerability analysis tools (e.g., debuggers or fuzzers). But <i>no special instructions</i> on how to use these tools <i>nor a</i> <i>custom harness</i> that that gives specialized knowledge about how to better find vulnerabilities.</p><p class="paragraph" style="text-align:left;">Claude worked like a human researcher: analyzing Git commit histories to find similar unpatched bugs, identifying unsafe function patterns like strcat, and understanding complex compression algorithms like LZW to craft exploits that traditional fuzzers miss.</p><p class="paragraph" style="text-align:left;">The team validated each bug before reporting: first having Claude validate and deduplicate, then a human validated the issue and wrote a patch. They focused on memory corruption vulnerabilities because they can be easily validated, by monitoring the program for crashes and running tools like address sanitizers to catch non-crashing memory errors.</p><p class="paragraph" style="text-align:left;">“Looking ahead, both we and the broader security community will need to grapple with an uncomfortable reality: language models are already capable of identifying novel vulnerabilities, and may soon exceed the speed and scale of even expert human researchers.”</p><p class="paragraph" style="text-align:left;">💡 The key part here is <i>without special instructions or a custom harness</i>, just Opus 4.6 going to town. We can reasonably expect with moderate to high scaffolding the outcome would be some to significantly better. </p><p class="paragraph" style="text-align:left;">I would be curious to know a bit more about the details though: after the automated validation, how many of the findings were still “false positives” / not interesting? How much did this cost (total, per bug)? How long did Opus run to find the bugs?</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=leAaedbTBfY&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Mace Windu vs Palpatine but it&#39;s a musical</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=KyD4GfPSzWQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">DJ KHALED: Sundae Conversation with Caleb Pressley</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://breachpool.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">breachpool</a> - Which company is going to get hacked next?</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">Noah Kagan - <a class="link" href="https://x.com/noahkagan/status/2019843805592318190?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">AppSumo revenue is down 50% over the past 2 years</a> - Software margins going down, LLMs killing low value software, it’s easier for devs to quite and start something new.</p></li><li><p class="paragraph" style="text-align:left;">Meme - <a class="link" href="https://www.reddit.com/r/ProgrammerHumor/comments/1r0hbi0/hopingnobodywillhavetodebugthislater/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">When you 100% vibe coded your app and it works</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;">Prof Galloway Markets - <a class="link" href="https://www.profgmarkets.com/p/did-ai-kill-software?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Did AI Kill Software?</a></p></li><li><p class="paragraph" style="text-align:left;">Ian Tracey - <a class="link" href="https://x.com/ian_dot_so/status/2013316676637294890/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">The K-Shaped Future of Software Engineering</a></p></li><li><p class="paragraph" style="text-align:left;">OpenAI President Greg Brockman - <a class="link" href="https://x.com/gdb/status/2019566641491963946?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Software development is undergoing a renaissance in front of our eyes</a>. “As a first step, by March 31st, we&#39;re aiming that: For any technical task, the tool of first resort for humans is interacting with an agent rather than using an editor or terminal.“</p></li><li><p class="paragraph" style="text-align:left;">Peter Girnus - <a class="link" href="https://x.com/gothburz/status/2019539563027247147?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">The SaaSpocalypse: How Eleven Free Plugins Exposed Tech&#39;s Biggest Lie</a></p></li><li><p class="paragraph" style="text-align:left;">Matt Shumer - <a class="link" href="https://x.com/mattshumer_/status/2021256989876109403?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Something Big Is Happening</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Politics</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/sw40K?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive</a> - Absolutely insane story and great reporting 🤯 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://missionlocal.org/2026/02/sf-garry-tan-california-politics-garrys-list/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Y Combinator CEO Garry Tan launches dark-money group to influence California politics</a></p></li><li><p class="paragraph" style="text-align:left;">Grok has been getting some flak for enabling users to <a class="link" href="https://www.wired.com/story/x-didnt-fix-groks-undressing-problem-it-just-makes-people-pay-for-it/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">create non consensual adult images and spicy pictures of minors</a>.</p></li><li><p class="paragraph" style="text-align:left;">Meanwhile, the Pentagon will be sharing <a class="link" href="https://apnews.com/article/artificial-intelligence-pentagon-hegseth-musk-7f99e5f32ec70d7e39cec92d2a4ec862?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">classified info and data from intelligence databases to Grok</a>.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/qGQjL?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">Trump’s campaign of retribution</a> - “Reuters documented at least 470 targets of retribution under Trump’s leadership – from federal employees and prosecutors to universities and media outlets. The list illuminates the sweeping effort by the president and his administration to punish dissent and reshape the government.”</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-315-securing-openclaw-top-10-web-hacking-techniques-of-2025-discovering-negative-days-with-llms" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=1bb5b85e-e6d5-456e-b003-56b9ee2169fd&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #314 - ClawdBot Security, Security Scorecards, Threat Framework for SDLC Infrastructure</title>
  <description>ClawdBot vulns, tools, and Skill scanners; measuring security with scorecards; new open-source framework mapping 70+ attack techniques across the SDLC</description>
  <link>https://tldrsec.com/p/tldr-sec-314</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-314</guid>
  <pubDate>Thu, 05 Feb 2026 15:30:29 +0000</pubDate>
  <atom:published>2026-02-05T15:30:29Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🗑️🔥 ClawdBot Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Well… what an exciting week to be in security 😆 </p><p class="paragraph" style="text-align:left;"><span style="text-decoration:line-through;">ClawdBot</span> <span style="text-decoration:line-through;">Moltbot</span> OpenClaw exploded with popularity as a powerful AI assistant.</p><p class="paragraph" style="text-align:left;">These AI bots have been posting on their own <a class="link" href="https://www.moltbook.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">social network</a>, created a <a class="link" href="https://molt.church/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">religion</a>, and more. </p><p class="paragraph" style="text-align:left;">There’s also been multiple critical OpenClaw bugs found, and hundreds of malicious Skills (as they’re essentially RCE).</p><p class="paragraph" style="text-align:left;">One could look at this and despair, but I actually find the speed with which all of these issues were discovered <i>heartening</i>. OpenClaw is speed-running its security journey.</p><p class="paragraph" style="text-align:left;">Having people from our security community leap into the fray, identify problems, and coordinate fixes with maintainers at this speed likely made <i>tens to hundreds of thousands of people safer.</i></p><p class="paragraph" style="text-align:left;">I think that’s something we can be proud of.</p><p class="paragraph" style="text-align:left;">There’s still a lot of work to be done, especially around making it easier for people to vibe <i>securely by default</i>, and platforms (like Supabase) can try to minimize their sharp edges.</p><p class="paragraph" style="text-align:left;">But our job is to keep people safe, and we’re doing that here.</p><p class="paragraph" style="text-align:left;">Now on to more systemic improvements that can meaningfully improve security posture at scale 🤘</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> The only AI SOC tool your analysts will fight to keep</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">There is a specific feeling SOC analysts get when they use Prophet Security: <b>Relief</b>.</p><p class="paragraph" style="text-align:left;">Why? Because for most, the daily reality is a cycle of repetitive data fetching and context-switching that buries actual threats under noisy queues.</p><p class="paragraph" style="text-align:left;">Prophet AI fundamentally alters this dynamic. The platform handles the heavy lifting before a human ever sees the ticket. This frees up SOC analysts to focus entirely on validation and remediation.</p><p class="paragraph" style="text-align:left;">This shift lowers risk and scales capacity without inflating operational costs. Once you operate with this level of clarity, you will refuse to go back to the old way.</p><h2 class="heading" style="text-align:center;"><b> 👉 </b><b><a class="link" href="https://hubs.ly/Q040Qyv70?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">See the difference in your queue</a></b><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">The SOC seems to be a great domain for AI agents: high volume of alerts, gathering info from various systems, etc. And nice, Prophet’s used by Docker, Redis, and more 👍️ </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://ramimac.me/scorecarding?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Scorecarding Security</a><br>Friend of the newsletter <a class="link" href="https://www.linkedin.com/in/ramimac/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Rami McCarthy</a> gives a great overview of the use of scorecarding in security programs, with examples and lessons from companies like Chime, Netflix, GitHub, and Atlassian. In general, the programs use a centralized dashboard and leaderboard to track security posture, vulnerabilities, and risk across applications and services. These give the leadership team visibility, gamify improving security, and educate service and code owners on security standards and posture. </p><p class="paragraph" style="text-align:left;">The post concludes with some examples of vulnerability management at Segment, Riot, and Uber.</p><p class="paragraph" style="text-align:left;">💡 I love overviews of what a bunch of companies are doing 😍 That’s what motivated my BSidesSF talk <b>“How to 10X Your Security (without the Series D)”</b> - <a class="link" href="https://docs.google.com/presentation/d/1lfEvXtw5RTj3JmXwSQDXy8or87_BHrFbo1ZtQQlHbq0/edit?slide=id.g7c8a58b51e_0_590&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure#slide=id.g7c8a58b51e_0_590" target="_blank" rel="noopener noreferrer nofollow">slides</a>, <a class="link" href="https://www.youtube.com/watch?v=tWA_EBNsQH8&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">YouTube</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.postman.com/engineering/product-security-scorecards-coupling-security-issues-with-preventative-controls-to-drive-security-maturity/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Product Security Scorecards: Coupling Security Issues with Preventative Controls to Drive Security Maturity</a><br>Postman&#39;s <a class="link" href="https://www.linkedin.com/in/gusdb/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Gustavo De Leon</a> describes how they developed Product Security Scorecards to help engineering teams manage security findings by aggregating vulnerabilities, control monitoring, and security requirements into a single dashboard. The system maps all services and artifacts to their builds, repos, and teams, then attributes security tool outputs to those teams, focusing on pairing Security Issues with Preventative Controls that address them proactively.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">For third-party dependency vulnerabilities, they implemented a five-level maturity model (Repo Scanning, PR Scanning, PR Blocking, Client-Side Scanning, and Client-Side Blocking). The Scorecards framework also tracks &quot;Security Asks&quot; like hardening tasks, audit/certification readiness, and release blockers, providing everyone from individual engineers to leadership with visibility into security posture with red/yellow/green scores.</p></div><p class="paragraph" style="text-align:left;">💡 This is great overview of how to build a thoughtful security scorecard program, love it. It covers a bunch of critical areas: tracking vulnerabilities and controls and mapping them to teams/repos, giving high level security performance visibility to stakeholders at different levels, being thoughtful and iterative about security scanning roll-outs, getting engineers invested in proactively wanting security controls because they see how it reduces future security workloads, determining which security controls/secure defaults to invest in based on prior vulnerabilities, etc.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">In a follow-up post, I&#39;d love to see a bit more of a tactical deep dive into how the repo &lt;&gt; team mapping was done (and maintained), what specific security controls/secure defaults were built and how, and any other actionable details that would help other security programs do this themselves.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Why Agentic AI Breaks Legacy Identity</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Agentic AI is non-deterministic. Legacy IAM is static. When you mix them, you get anonymous execution and credential sprawl. Stop treating agents like static workloads. Join Teleport CEO Ev Kontsevoy and Analyst Craig Matsumoto to fix your foundation.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://goteleport.com/why-agentic-ai-breaks-legacy-identity/?utm_campaign=AI&utm_content=webinar&utm_medium=newsletter&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>Save Your Spot</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Identity and authorization is clearly becoming more important in a world of agents (see AI + Security section below). Important, foundational area, definitely worth learning more about 👆️ </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chainguard.dev/unchained/running-renovate-as-a-github-action?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Running Renovate as a GitHub Action (and NO PAT!)</a><br>Chainguard’s <a class="link" href="https://www.linkedin.com/in/adrianmouat/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Adrian Mouat</a> walks through setting up <a class="link" href="https://www.mend.io/renovate/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Renovate</a> to automate dependency updates while avoiding long-lived GitHub Personal Access Tokens by using <a class="link" href="https://github.com/apps/octo-sts?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Octo STS</a>, an open source security token service that trades OIDC tokens for short-lived GitHub tokens with elevated privileges. This approach can also update GitHub Actions, which the default GitHub Action token can’t do.</p><p class="paragraph" style="text-align:left;">💡 Eliminating the use of PATs, which are often stolen in supply chain attacks. I like it!</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/sitf-sdlc-threat-framework?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Introducing SITF: The First Threat Framework Dedicated to SDLC Infrastructure</a><br>Wiz’s <a class="link" href="https://linkedin.com/in/shay-berkovich-0a09975?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Shay Berkovich</a> introduces SITF (SDLC Infrastructure Threat Framework), an open-source framework mapping 70+ attack techniques across five SDLC pillars (Endpoint/IDE, VCS, CI/CD, Registry, Production). The framework includes an Attack Flow Visualizer for drag-and-drop threat modeling that auto-generates prioritized defense matrices based on a causal chain model linking Risks → Techniques → Controls.</p><p class="paragraph" style="text-align:left;">The post walks through modeling Shai-Hulud 2.0 using SITF, and the framework runs entirely client-side with no data leaving your machine. You can view the live site <a class="link" href="https://wiz-sec-public.github.io/SITF/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">here</a> or clone it on GitHub <a class="link" href="https://github.com/wiz-sec-public/SITF?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">here</a>. </p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Who Operates the Badbox 2.0 Botnet?</a><br><a class="link" href="https://www.linkedin.com/in/bkrebs/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Brian Krebs</a> investigates the Kimwolf botmasters&#39; claimed compromise of the Badbox 2.0 control panel via some OSINT wizardry, pivoting across email addresses, domain registration records, shared passwords, phone numbers, etc. and ends up naming names of two likely Badbox 2.0 operators. This unauthorized control panel access would allow Kimwolf operators to bypass residential proxy provider patches and directly load malware onto millions of Badbox 2.0-infected Android TV boxes. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">No Place Like Home Network: Disrupting the World&#39;s Largest Residential Proxy Network</a><br>Google Threat Intelligence Group (GTIG) disrupted IPIDEA, one of the world&#39;s largest residential proxy networks, by taking down C2 domains, sharing intelligence on malicious SDKs (Castar, Earn, Hex, and Packet SDK) with partners, and enabling Google Play Protect to remove 600+ Android apps incorporating these SDKs. They found IPIDEA controls 13 proxy/VPN brands (including 360 Proxy, IP 2 World, PIA S5 Proxy, and Luna Proxy) and uses a two-tier C2 infrastructure that proxies traffic through millions of hijacked residential devices. </p><p class="paragraph" style="text-align:left;">GTIG observed over 550 threat groups from China, DPRK, Iran, and Russia using IPIDEA exit nodes in a single week for activities including accessing a victim’s SaaS environments, password spraying, and accessing on-prem infrastructure. The SDKs were distributed through trojanized VPNs (Galleon VPN, Radish VPN), Windows binaries masquerading as OneDriveSync/Windows Update, and uncertified Android TV boxes.</p><p class="paragraph" style="text-align:left;">💡 Holy cow, the scale of this is incredible. Excellent work GTIG et al! 🙌 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/Maldev-Academy/DumpBrowserSecrets?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Maldev-Academy/DumpBrowserSecrets</a><br>By <a class="link" href="https://x.com/MalDevAcademy?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">MalDev Academy</a>: Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX, and Vivaldi)</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://ipurple.team/2026/01/12/edr-silencing/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">EDR Silencing</a><br>Purple Team gives an overview of EDR Silencing techniques that disrupt communication between EDR agents and their cloud consoles without crashing processes, covering six methods: Windows Filtering Platform (WFP) abuse via tools like EDRSilencer, SilentButDeadly, and WFP_EDR; hosts file modification to redirect EDR domains to localhost; Name Resolution Policy Table (NRPT) manipulation to redirect DNS queries; IPSec filter rules via netsh to block traffic; routing table tampering; and secondary IP address assignment using IPMute to capture and locally assign EDR server IPs. The post ends with a SIGMA rule detecting WFP-blocked outbound connections from common EDR processes.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/claude-code-devcontainer?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">trailofbits/claude-code-devcontainer</a> - Sandboxed devcontainer for running Claude Code in bypass mode safely. Built for security audits and untrusted code review.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/dropkit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">trailofbits/dropkit</a> - A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.cloudflare.com/moltworker-self-hosted-ai-agent/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Moltworker</a> - You can run Moltbot/OpenClaw serverless via Cloudflare workers. It uses: sandboxes SDK for isolated code execution, Browser Rendering for Chromium automation via a CDP proxy, R2 for persistent storage mounted as a filesystem, and AI Gateway with BYOK/Unified Billing for model management.</p></li><li><p class="paragraph" style="text-align:left;">Nice video overview of <a class="link" href="https://www.youtube.com/watch?v=TibOeou4cIg&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Moltbook and recent events</a> by The AI Daily Brief</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://1password.com/blog/its-openclaw?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">1Password blog on OpenClaw</a> - “Security for agents is not about granting access once. It is about continuously mediating access at runtime for every action and request.” Your agent should get a new identity like a new hire, receive access through a secrets manager instead of long-lived tokens on disk, authority is time-bound, revocable, and attributable to the agent, not the human who clicked approve.</p></li><li><p class="paragraph" style="text-align:left;">Daniel Miessler’s OpenClaw <a class="link" href="https://x.com/DanielMiessler/status/2015865548714975475?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">security hardening recommendations</a></p></li><li><p class="paragraph" style="text-align:left;">Securing AI Internet hero Jamieson O’Reilly <a class="link" href="https://x.com/theonejvo/status/2017732898632437932?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">found</a> that Moltbook, the “social media” site for AI agents, didn’t properly secure their Supabase config, enabling anyone to access every agent’s secret API key, verification codes, etc. and thus post as anyone’s agent, even Andrej Karpathy. <a class="link" href="https://www.404media.co/exposed-moltbook-database-let-anyone-take-control-of-any-ai-agent-on-the-site/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">404 Media</a> </p><ul><li><p class="paragraph" style="text-align:left;">Gal Nagli seems to have found the same issue concurrently. <a class="link" href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Wiz blog</a></p></li></ul></li><li><p class="paragraph" style="text-align:left;">Aikido’s Charlie Eriksen - <a class="link" href="https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Fake Clawdbot VS Code Extension Installs ScreenConnect RAT</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">1-Click RCE To Steal Your Moltbot Data and Keys</a> - depthfirst’s <a class="link" href="https://www.linkedin.com/in/mavlevin/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Mav Levin</a> describes how he was able to chain vulnerabilities: if a user clicks on a link with a malicious <code>gatewayUrl</code> query parameter it can leak the victim&#39;s auth token to an attacker-controlled server, combined with Cross-Site WebSocket Hijacking (CSWSH) to bypass <code>localhost</code> restrictions since OpenClaw&#39;s WebSocket server doesn&#39;t validate the <code>origin</code> header.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/knostic/openclaw-detect?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">knostic/openclaw-detect</a><br>By <a class="link" href="https://www.linkedin.com/company/knostic/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Knostic</a>: Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/knostic/openclaw-telemetry?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">knostic/openclaw-telemetry</a><br>By <a class="link" href="https://www.linkedin.com/company/knostic/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Knostic</a>: Telemetry for OpenClaw: captures tool calls, LLM usage, agent lifecycle, and message events. Outputs to JSONL file and optionally to a SIEM.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://promptintel.novahunting.ai/molt?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">MoltThreats</a><br>By <a class="link" href="https://www.linkedin.com/posts/thomas-roccia_let-me-introduce-you-to-moltthreats-the-activity-7423676820002127872-n51Z?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Thomas Roccia</a>: Agent-native threat intel feed where AI agents report attacks and receive curated protections. MoltThreats operates through an agent skill: when it discovers a threat, it sends a structured report to MoltThreats, which a human reviews, and then approved ones are published to a public feed that any agent can query to update their security baseline.</p><p class="paragraph" style="text-align:left;">💡 I really like the meta idea of this: distribute detection/alerting to a broad swathe of individuals running agents, which then report back and a human triages.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blogs.cisco.com/ai/personal-ai-agents-like-openclaw-are-a-security-nightmare?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Personal AI Agents like OpenClaw Are a Security Nightmare</a><br>Cisco’s <a class="link" href="https://www.linkedin.com/in/helloamychang?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Amy Chang</a> and <a class="link" href="https://www.linkedin.com/in/vineethsai/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Vineeth Sai Narajala</a> describe how Skills are basically code execution by design, and release <a class="link" href="https://github.com/cisco-ai-defense/skill-scanner?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Skill Scanner</a>, an open source tool that analyzes Claude Skills and OpenAI Codex skills for security threats (prompt injection, data exfiltration, and malicious code patterns) by combining static analysis (YAML + YARA), behavioral dataflow analysis, LLM-assisted semantic analysis (LLM-as-judge), and VirusTotal scanning.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://opensourcemalware.com/blog/clawdbot-skills-ganked-your-crypto?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">ClawdBot Skills Just Ganked Your Crypto</a><br>The OpenSourceMalware team and <a class="link" href="https://www.linkedin.com/in/mccartypaul/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Paul McCarty</a> found malicious ClawdBot Skills targeting ByBit, Polymarket, Axiom, Reddit and LinkedIn that install malware, steal crypto, etc. ~386 affected Skills, over 7,000 downloads. When informed of the malicious Skills, the OpenClaw’s creator’s response was basically, “I don’t have a team to vet user generated content, people should just use their brain when finding Skills.” </p><p class="paragraph" style="text-align:left;">“Many of the payloads we found were visible in plain text in the first paragraph of the <code>SKILL.md</code> file… within a few minutes we found our first malicious payload.” 🤦‍♂️ </p><p class="paragraph" style="text-align:left;">Bloom Security’s <a class="link" href="https://www.linkedin.com/in/ofir-balassiano?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Ofir Balassiano</a> also wrote about active ClawdHub malware campaigns <a class="link" href="https://medium.com/bloom-security/another-issue-i-may-need-a-claw-nex-dee799e7740c?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Privacy</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://support.apple.com/en-us/126101?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Limit precise location from cellular networks</a> - New feature on some iPhone and iPad models that limits how precisely cell networks can determine your location. As <a class="link" href="https://techcrunch.com/2026/01/29/apples-new-iphone-and-ipad-security-feature-limits-cell-networks-from-collecting-precise-location-data/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">TechCrunch</a> describes, law enforce agencies are increasingly tapping cell carriers to access the location data of individuals for tracking them in real time, or examining where they have traveled over a period of time.</p></li><li><p class="paragraph" style="text-align:left;">The Verge - <a class="link" href="https://www.theverge.com/policy/868571/best-gas-masks?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Best gas masks</a> - You should not need a gas mask to attend a peace protest in America, but here we are. See also: <a class="link" href="https://www.uaw4121.org/wp-content/uploads/2020/11/Guide-to-PPE.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Guide to Protest PPE</a>.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=YxgsxaFWWHQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">You Have No Idea What Gandalf Is</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=iU9FEimgsRw&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">The Lord of the Rings from Sauron&#39;s perspective</a> </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/1x9qhvRiAqc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">The camera tricks</a> they did to make Gandalf and Frodo appear to be very different sizes is impressive</p><ul><li><p class="paragraph" style="text-align:left;">Apparently this week I’ve trained my YouTube algorithm to show me LoTR contents, and I’m here for it 🧙‍♂️ </p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/jfwySpONFgc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Arnold meets Anatoly</a> - If you haven’t watched any Anatoly videos, you’re missing out 😂 And the genuine compliments and kindness was very nice.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/hDYaMBV9e7Q?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Cillian Murphy on what happens when the shooting is over</a> - Sounds tough actually.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.anthropic.com/news/claude-is-a-space-to-think?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Claude is a space to think</a> - Anthropic’s post on not allowing ads in Claude.</p></li><li><p class="paragraph" style="text-align:left;">Anthropic’s savage 🌶️ ads on AI providers doing ads: <a class="link" href="https://www.youtube.com/watch?v=kQRu7DdTTVA&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Can I get a six pack quickly?</a>, <a class="link" href="https://www.youtube.com/watch?v=FBSam25u8O4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">How can I communicate better with my mom?</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Music</p><ul><li><p class="paragraph" style="text-align:left;">Iliya Shojaei - <a class="link" href="https://www.youtube.com/watch?v=LVohFfDaOjI&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Don&#39;t Love Your Job, Job Your Love</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=S24Fot2FJJc&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Disney Composer Alan Menken Breaks Down His Most Iconic Songs</a> - The Little Mermaid, Beauty and the Beast, Aladdin, Pocahontas, Hercules. Alan Menken has had such an incredible career.</p></li><li><p class="paragraph" style="text-align:left;">Levisct - <a class="link" href="https://www.youtube.com/watch?v=bAEKaW_oFmU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">PIANOMANNIAKS</a> - This solo piano + beats is absolutely insane. </p></li><li><p class="paragraph" style="text-align:left;">Charles Cornell - <a class="link" href="https://www.youtube.com/watch?v=9OplfRgWZ7Q&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">The INSANE Story Of Pirates Of The Caribbean&#39;s Soundtrack</a> - The melody breakdown is cool, and the connection to Gladiator 🤯 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=GGs_NT4iL2c&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">Hans Zimmer Breaks Down His Career, from &#39;Gladiator&#39; to &#39;Interstellar&#39;</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/@ImprovBroadway?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">ImprovBroadway</a> - Comedic songs made up on the spot, glorious 🥰 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/TanmayCzax/AETHRA?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">AETHRA</a> - A new domain-specific programming language (DSL) designed to compose music using code. Instead of focusing on low-level audio math, AETHRA lets creators express emotion, harmony, and musical structure through readable commands.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-314-clawdbot-security-security-scorecards-threat-framework-for-sdlc-infrastructure" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=bfeace3f-862a-45dc-9fcd-3ce05b1ff871&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #313 - MCP Security Hub, IDE-Shepherd, Plaid&#39;s Security Pipeline as Code</title>
  <description>MCP servers for offensive security tools, Datadog&#39;s IDE extension to protect against malicious IDE extensions, how Plaid scales security scanning across 100s of services</description>
  <link>https://tldrsec.com/p/tldr-sec-313</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-313</guid>
  <pubDate>Thu, 29 Jan 2026 15:30:27 +0000</pubDate>
  <atom:published>2026-01-29T15:30:27Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🎶 Weird Al</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Last week, I saw something I never thought I would…</p><p class="paragraph" style="text-align:left;"><i>We cut to the early 2000s, Clint is in high school.</i></p><p class="paragraph" style="text-align:left;">I loved Weird Al Yankovic, and listened to him regularly with my dad in the car. Weird Al was actually one of the first live concerts I ever attended.</p><p class="paragraph" style="text-align:left;">Flash forward to last weekend. As a part of SF SketchFest I saw… a Weird Al-inspired burlesque show called “Tight and Nerdy” 😂 (<a class="link" href="https://www.youtube.com/watch?v=N9qYF9DZPdw&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">reference</a>)</p><p class="paragraph" style="text-align:left;">A number of people in the audience dressed up as Weird Al from various eras, which was delightful.</p><p class="paragraph" style="text-align:left;">There was a dancing can of spam, for <a class="link" href="https://www.youtube.com/watch?v=lOfZLb33uCg&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Amish Paradise</a> a butter churner got put to work, and I may never look at Yoda the same way again.</p><p class="paragraph" style="text-align:left;">Both Weird Al, and the show, are a celebration of being weird, and leaning into your thing, whatever it is.</p><p class="paragraph" style="text-align:left;">I like it.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>New guide: The future of IT infrastructure</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Modern IT infrastructure is mission-critical. But most IT Ops teams are still relying on manual workflows to manage capacity, reliability, and scale.</p><p class="paragraph" style="text-align:left;">The result? <b>Hidden waste</b>, <b>slower incident response</b>, <b>growing risk</b>, and<b> teams stuck firefighting</b> instead of improving systems.</p><p class="paragraph" style="text-align:left;">Tines published a <a class="link" href="https://www.tines.com/access/guide/the-future-of-it-infrastructure/?utm_source=tl;drsec&utm_medium=paid_media&utm_content=newsletter-primary-2901" target="_blank" rel="noopener noreferrer nofollow">new guide for IT teams</a> that shows how to change that. In the guide you’ll learn: </p><ul><li><p class="paragraph" style="text-align:left;">Why manual capacity management quietly drives <b>cost and operational drag</b></p></li><li><p class="paragraph" style="text-align:left;">How intelligent workflows enable <b>predictable, auditable scaling</b></p></li><li><p class="paragraph" style="text-align:left;">Practical ways to orchestrate infrastructure<b> using the tools you already have </b></p></li></ul><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.tines.com/access/guide/the-future-of-it-infrastructure/?utm_source=tl;drsec&utm_medium=paid_media&utm_content=newsletter-primary-2901" target="_blank" rel="noopener noreferrer nofollow"><b>Get the guide</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">Totally agree it’s essential to automate and streamline workflows so you get leverage, not buried over time. Also: “moving from alert-driven firefighting to automated response.” 👌 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://vercel.com/changelog/automated-react2shell-vulnerability-patching-is-now-available?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Automated React2Shell vulnerability patching is now available</a><br>Vercel Agent now detects vulnerable packages in your project, and automatically generates pull requests with fixes to upgrade them to patched versions.</p><p class="paragraph" style="text-align:left;">💡 This is cool, I’d love to see more “let us harden your config / setup / environment for you” products and features.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://bour.ch/how-rep-helped-me-identify-a-critical-supabase-jwt-exposure?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">How rep+ Helped Me Identify a Critical Supabase JWT Exposure</a><br><a class="link" href="https://www.linkedin.com/in/bohr/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Bour Abdelhadi</a> describes how he used <a class="link" href="https://github.com/repplus/rep-chrome?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">rep+</a> to discover a publicly exposed Supabase anonymous JWT in a website&#39;s JavaScript. rep+ is Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks, recently integrated with <a class="link" href="https://github.com/mongodb/kingfisher/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Kingfisher</a> for secret detection. He then tested whether Row Level Security (RLS) was properly enforced on the backend by enumerating REST endpoints (thus enumerating tables and RPC functions exposed), and found he was able to read the <code>password_reset_tokens</code> table, enabling full account takeover.</p><p class="paragraph" style="text-align:left;">Bour also released <a class="link" href="https://github.com/bscript/supabase-exposure-check?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">supabase-exposure-check</a>, a Python script that scans websites for exposed Supabase JWT tokens, enumerates accessible database tables, and analyzes them for sensitive data exposure.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://plaid.com/blog/security-as-a-platform?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Security as a platform: Codifying scans, signals, and guardrails</a><br><a class="link" href="https://www.linkedin.com/in/larkinscarvalho?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Larkins Carvalho</a> describes how Plaid built “Security Pipeline as Code” to scale security scanning across hundreds of services by treating security controls as infrastructure: using shared CI templates, Terraform modules, and a hosted control plane with in-VPC scan execution. The system dynamically orchestrates security domains (SAST with custom rules from incidents/bug bounties, reachability-aware SCA, IaC and secrets scanning, AI-powered business logic analysis). Sub-5 minute feedback, contextual remediation guidance specific to Plaid, given directly in GitHub. </p><p class="paragraph" style="text-align:left;">Technical wins: encoding organization-specific security baselines as Semgrep rules (like enforcing zero-trust authorization policies) and auto-resolving fixed vulnerabilities to eliminate manual triage busywork. Repos onboard with a single Terraform line, and findings flow into a unified vulnerability management system with team attribution and SLA tracking. The platform achieved 95%+ repository coverage by launching rule sets in soft-fail mode first to tune false positives before blocking merges.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><i>“Security learnings from findings to architectural decisions to baselines are turned into automated, institutional knowledge that shows up on PRs across our repos.”</i></p></div><p class="paragraph" style="text-align:left;">💡 This is a <b>great</b> write-up on building a scalable AppSec program, covering so many of the things I see consistently across good programs: org-specific remediation guidance, treating all signals (bug bounty submissions, prior vulns, pen test reports) as things to codify and continuously scan for going forward, emphasizing compounding wins, etc.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> Your Agent Just Ran kubectl. </b><br><b>Was It Supposed To?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">AI agents have production access (e.g., file system, shell, databases, MCP servers), but security tools weren&#39;t built for this: EDR can&#39;t tell if kubectl was intentional or prompt-injected, while secrets managers don&#39;t know if the request came from an engineer or an agent. The 2026 Agent Risks Technical Brief covers these blind spots and which controls actually work.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.mintmcp.com/tldrsec-agent-risks?utm_source=tldrsec&utm_medium=newsletter&utm_campaign=20260129" target="_blank" rel="noopener noreferrer nofollow" style="color: #2C81E5"><b>Get the Technical Brief</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Nice, love the focus on agent visibility and guardrails, this is an important area right now. MintMCP also has a good paper on <a class="link" href="https://arxiv.org/pdf/2511.20920?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Securing the Model Context Protocol</a>.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Container Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.qualys.com/product-tech/2026/01/22/public-container-registry-security-risks-malicious-images?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Public Container Registry Risks 2026: Malicious Images & Mitigation</a><br>Qualys’ <a class="link" href="https://www.linkedin.com/in/amitgadhave17/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Amit Gadhave</a> analyzed over 34,000 public container images and found that 60% had fewer than 1,000 pulls, and 4% contained cryptomining malware, with 70% of confirmed malicious images being cryptominers, primarily targeting Monero using XMRig. Typo squatting was the common distribution technique, where attackers mimic legitimate image names like nginx, ubuntu, drupal, and joomla to trick users into pulling malicious containers. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cybersecnerds.com/badpods-series-everything-allowed-on-aws-eks?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">BadPods Series: Everything Allowed on AWS EKS</a><br><a class="link" href="https://www.linkedin.com/in/kirandawadi/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Kiran Dawadi</a> shares a write-up of the “Everything Allowed” bad pod from Bishop Fox’s <a class="link" href="https://github.com/BishopFox/badPods?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">BadPods</a> project, which is a collection of Kubernetes manifests that create pods with dangerous configurations. The post shows how a pod with <code>privileged: true</code>, <code>hostPath: /</code>, <code>hostNetwork: true</code>, and <code>hostPID: true</code> flags enabled can lead to complete cluster and cloud compromise on AWS EKS. </p><p class="paragraph" style="text-align:left;">Kiran shows three attack paths: escaping to the host node via chroot and accessing /var/lib/kubelet, lateral movement to other pods using nerdctl and nsenter to enumerate containers and enter their namespaces, and stealing IAM credentials from the EC2 metadata service at 169.254.169.254 (both IMDSv1 and IMDSv2).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://heilancoos.github.io/research/2025/12/16/kubernetes.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">A Brief Deep-Dive into Attacking and Defending Kubernetes</a><br>Quite detailed, lengthy post by <a class="link" href="https://www.linkedin.com/in/alexis-o/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Alexis Obeng</a> giving an overview of how Kubernetes works, threat hunting in k8s, and attack techniques and defensive strategies. The post covers unauthenticated API access, overly permissive RBAC, ServiceAccount token abuse, malicious admin controllers, CoreDNS poisoning, writable volume mounts, ETCD unauthorized access, and the Kubernetes Golden ticket technique. For each, Alexis gives an overview, then defensive strategies, and then a Falco rule to detect it.</p><p class="paragraph" style="text-align:left;">See the <a class="link" href="https://github.com/heilancoos/k8s-custom-detections?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">k8s-custom-detections</a> GitHub repo for the Falco detection rules, audit policies, sample attack manifests, and configuration files that go along with this post.</p><p class="paragraph" style="text-align:left;">💡 Wow, according to her <a class="link" href="https://heilancoos.github.io/about?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">About page</a>, Alexis is still in college 🤯 She’s graduating in Spring 2026, and <i>looking for opportunities</i>. If you’re a hiring manager, you can reach out to her on <a class="link" href="https://www.linkedin.com/in/alexis-o/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a>.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.koi.ai/blog/how-we-prevented-cursor-windsurf-google-antigravity-from-recommending-malware?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">How We Prevented Cursor, Windsurf & Google Antigravity from Recommending Malware</a><br>Koi’s <a class="link" href="https://www.linkedin.com/in/orenyomtov/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Oren Yomtov</a> discovered that popular AI IDEs (Cursor, Windsurf, Google Antigravity) inherited VSCode&#39;s extension recommendation config but switched to the OpenVSX marketplace (licensing reasons), creating a supply chain vulnerability where officially recommended extensions didn&#39;t exist and their namespaces were unclaimed. So basically the IDEs were like, “You should install &lt;this extension&gt;” but anyone could register it. Koi preemptively registered the vulnerable namespaces, phew.</p><p class="paragraph" style="text-align:left;">💡 I’m periodically surprised that software mostly works and the world hasn’t crumbled.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Threat Actors Expand Abuse of Microsoft Visual Studio Code</a><br>Jamf’s <a class="link" href="https://www.linkedin.com/in/thijs-xhaflaire-290b63a5/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Thijs Xhaflaire</a> describes the latest evolution of the Contagious Interview campaign, in which DPRK threat actors target developers via backdoored repos. User clones, opens, and trusts malicious repo → VSCode <code>task.json</code> triggers download from malicious server → payload executed via Node.js runtime → system fingerprinting → persistent beacon to C2 server awaiting arbitrary JavaScript code.</p><p class="paragraph" style="text-align:left;">The payload “has inline comments and phrasing that appear to be consistent with AI-assisted code generation.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://securitylabs.datadoghq.com/articles/ide-shepherd-release-article?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE</a><br>Datadog’s <a class="link" href="https://www.linkedin.com/in/tesnim-hamdouni/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Tesnim Hamdouni</a> announces <a class="link" href="https://github.com/DataDog/IDE-Shepherd-extension?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">IDE-SHEPHERD</a>, an open source IDE extension that uses real-time runtime protection + heuristics to protect against malicious extensions and supply chain attacks. It uses a “require-in-the-middle” (<code>RITM</code>) layer to patch critical <code>Node.js</code> modules such as <code>child_process</code>, <code>http</code>, and <code>https</code> to intercept and block malicious operations like PowerShell-encoded commands, suspicious network requests, and auto-executing .vscode/tasks.json files before they execute.</p><p class="paragraph" style="text-align:left;">IDE-SHEPHERD combines this runtime defense with heuristic detection that analyzes extension metadata for anomalies such as missing repository links, suspicious version numbers, wildcard activations, and signs of obfuscation.</p><p class="paragraph" style="text-align:left;">💡 Yo dawg, I heard you’re worried about malicious IDE extensions, so I built you an IDE extension to analyze IDE extensions 😂 </p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b> </p><ul><li><p class="paragraph" style="text-align:left;">Varonis discovered <a class="link" href="https://www.varonis.com/blog/stanley-malware-kit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Stanley</a>, a $6,000 malware-as-a-service toolkit sold on Russian cybercrime forums that packages a malicious Chrome extension that they guarantee will pass the Chrome Web Store vetting.</p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(44, 129, 229);"><b><a class="link" href="https://community.tracebit.com?utm_source=tldrsec&utm_campaign=tldrsec313link" target="_blank" rel="noopener noreferrer nofollow">Free Canary Tokens: SSH, Browser Session Cookie, Email, AWS and more by Tracebit</a></b></span><span style="color:rgb(44, 129, 229);"> </span><span style="color:rgb(0, 0, 0);">— Tracebit recently launched their ‘Community Edition’ - free canary tokens and a local CLI to manage and maintain them. Sign up to deploy canaries in minutes.</span>*</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/MHaggis/ADTrapper?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">MHaggis/ADTrapper</a> - A self-hosted Active Directory security analysis platform that processes Windows authentication logs and BloodHound data to detect threats through 54+ detection rules covering brute force, password spray, privilege escalation, and ADCS attacks.</p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">North Korean infiltrator caught working in Amazon IT department thanks to lag</a><br>They caught them over a 110ms keystroke input lag 🤯 “Schmidt says that Amazon has foiled more than 1,800 DPRK infiltration attempts since April 2024. Moreover, the rate of attempts continues apace, with Amazon reckoning it is seeing a 27% QoQ uplift in North Koreans trying to get into the Amazon corporation.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://detecteng.com/centralized-suppression-management-for-detections-using-macros-lookups-be87ffc2f954?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Centralized suppression management for detections using macros & lookups</a><br><a class="link" href="https://www.linkedin.com/in/harrisonpomeroy/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Harrison Pomeroy</a> describes a centralized suppression management system for Splunk detections using macros and lookups, enabling analysts to self-service tune alerts without directly modifying detection logic. The solution uses a CSV lookup table containing alert names, suppression criteria (SPL logic), expiration timestamp, etc. combined with a macro that dynamically injects <code>NOT</code> conditions into detection queries.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Background: “A <i>lookup</i> in a SIEM is an external data table that your detections, queries, and dashboards can reference to enrich events or influence logic. A <i>macro</i> is a reusable piece of logic often a short function, expression, or template, that you can reference throughout your platform to avoid repeating the same code in multiple places.”</p></div><p class="paragraph" style="text-align:left;">💡 I like the bigger picture idea of letting the end consumers of an alert (analysts) tune the rule without relying on the authors (detection engineers), while still tracking who made the changes and why. The self-service helps with buy-in and giving people a feeling of agency.</p><p class="paragraph" style="text-align:left;">Analogous example: letting developers tune the code scanning rules that generate comments on their PRs (of course while keeping an audit trail that the security team reviews).</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/theonejvo/status/2016510190464675980?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">eating lobster souls Part III (the finale): Escape the Moltrix</a><br>Clawdbot (now <a class="link" href="https://www.molt.bot?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Molt</a>) has gotten a lot of hype recently. In part 1, <a class="link" href="https://x.com/theonejvo?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Jamieson O&#39;Reilly</a> found hundreds of Clawdbot control servers that were misconfigured, leaking API keys, OAuth tokens, conversation histories, etc. In part 2, he built a simulated backdoored skill, inflated its download count to #1 on ClawdHub using a trivial API vulnerability, and watched 16 developers across 7 countries execute arbitrary commands on their machines within 8 hours.</p><p class="paragraph" style="text-align:left;">In part 3, Jamieson found that you can include JavaScript in an SVG that’s uploaded to ClawdHub, which is served from the main <code>clawdhub.com</code> domain, so it can read your authentication cookies, make API requests on your behalf, etc. An attacker could, for example, use this to compromise your account and then backdoor any skill you’ve uploaded, which will then backdoor anyone who uses them.</p><p class="paragraph" style="text-align:left;">💡 The amount of rapidly newly popular things with 2010 era bugs is impressive. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/FuzzingLabs/mcp-security-hub?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">FuzzingLabs/mcp-security-hub</a><br>By <a class="link" href="https://www.linkedin.com/company/fuzzinglabs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">FuzzingLabs</a>: A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more. 24 MCP Servers, 100+ security tools accessible via natural language, production hardened: non-root containers, minimal images, Trivy-scanned.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/MHaggis/Security-Detections-MCP?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">MHaggis/Security-Detections-MCP</a><br>By <a class="link" href="https://linkedin.com/in/michaelahaag?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Michael Haag</a>: An MCP server that lets LLMs query a unified database of Sigma, Splunk ESCU, Elastic, and KQL security detection rules. The server includes 11 pre-built MCP prompts that provide structured, expert-level workflows for common security detection tasks, including: ransomware readiness assessment, APT threat emulation, purple team exercise, SOC investigation assist, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://sansec.io/research/claude-finds-353-zero-days-packagist?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Claude finds 353 zero-days on Packagist</a><br><a class="link" href="https://www.linkedin.com/company/sansec/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Sansec</a> describes building a four-stage pipeline using Claude Opus 4.5 to audit the top 5,000 Magento extensions on Packagist, discovering 353 confirmed vulnerabilities (265 IDOR/auth bypass, 50 SQLi, 23 arbitrary file read/write, 15 RCE) across packages with 5.9 million downloads. The pipeline consists of an Aggregator (queries Packagist), Security Auditor (static analysis focusing on non-admin exploitable issues), Vulnerability Reproducer (spins up Docker containers with fresh Magento installs to validate findings via curl PoCs, 79% reproduction rate), and WAF Suggestor (generates active filtering rules). The entire audit cost $10,000 in API calls ($2 per extension, ~$30 per working exploit 😅).</p><p class="paragraph" style="text-align:left;">💡 It’s cool that they released the security auditor and reproducer prompts! Also, neither of the prompts are incredibly complex, so to me this is another example of “point frontier models at source code with a reasonable prompt → real bugs!” My colleagues and I also did that <a class="link" href="https://semgrep.dev/blog/2025/finding-vulnerabilities-in-modern-web-apps-using-claude-code-and-openai-codex/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">here</a>.</p><p class="paragraph" style="text-align:left;">One thing I found surprising: “So far we have manually verified 30% of results and found <i>no false positives</i> for the verified vulnerabilities.” Another case for why automatic validation is so powerful/important, but I find it hard to believe there were no FPs 🤔 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=36AURx7PpeU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Robert Downey Jr’s Iron Man Audition</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.openculture.com/2026/01/j-r-r-tolkien-reads-from-the-hobbit-for-30-minutes-1952.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">J.R.R. Tolkien, Using a Tape Recorder for the First Time, Reads from The Hobbit for 30 Minutes (1952)</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://en.wikipedia.org/wiki/1000_Blank_White_Cards?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">1000 Blank White Cards</a> - A party card game played with cards in which the deck is created as part of the game.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://punkx.org/unix-pipe-game/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">The UNIX Pipe Card Game</a> - A card game for teaching kids how to combine unix commands through pipes.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reuters.com/graphics/SOUTHEASTASIA-SCAMS/MANUALS/klpyjlqelvg/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">A scammer’s blueprint</a> - How cybercriminals plot to rob a target within a week. Handbooks found during a police raid on a compound used by a cyberfraud gang in the Philippines show detailed instructions in Chinese for the psychological techniques used for conducting romance scams. Sad ☹️ </p></li><li><p class="paragraph" style="text-align:left;">Tiago Forte - <a class="link" href="https://www.youtube.com/watch?v=zjKUX7sHEGI&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">From Chaos to Clarity: My 30-Minute Weekly Review System</a></p></li><li><p class="paragraph" style="text-align:left;">Dan Koe - <a class="link" href="https://x.com/thedankoe/status/2010751592346030461/?rw_tt_thread=True&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">How to fix your entire life in 1 day</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">Codacy co-founder Jaime Jorge’s <a class="link" href="https://www.linkedin.com/posts/jaimejorge_yesterday-i-interviewed-geoffrey-huntley-activity-7417151256311345152-hkXT?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">notes from interviewing Geoffrey Huntley, creator of the Ralph loop</a>, on the future of software engineering.</p></li><li><p class="paragraph" style="text-align:left;">@rahulgs - <a class="link" href="https://x.com/rahulgs/status/2006090208823910573?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">the no unforced-errors ai leader playbook</a></p></li><li><p class="paragraph" style="text-align:left;">@yishan’s <a class="link" href="https://x.com/yishan/status/1987787127204249824?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">AI investment thesis</a> - “Every AI application startup is likely to be crushed by rapid expansion of the foundational model providers.” Two ways to make money: make a flash-in-the-pan app that generates a ton of cash and bank it, or make a good enoguh app that you get acquired by a big player.</p></li><li><p class="paragraph" style="text-align:left;">@basedjensen - <a class="link" href="https://x.com/basedjensen/status/2005946539991040104?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">POV me and Claude Opus 4.5 shipping</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;">World Economic Forum 2026 - <a class="link" href="http://Google&#39;s Demis Hassabis, Anthropic&#39;s Dario Amodei Debate the World After AGI" target="_blank" rel="noopener noreferrer nofollow">Google&#39;s Demis Hassabis, Anthropic&#39;s Dario Amodei Debate the World After AGI</a></p></li><li><p class="paragraph" style="text-align:left;">Greptile argues <a class="link" href="https://www.greptile.com/blog/ai-code-review-bubble?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">There is an AI Code Review Bubble</a> - I agree, and it’s not clear to me why these dev-focused code review companies are going to give meaningfully better results than Claude Code/Codex (or like a Cursor or Cognition) with some good skills or prompts.</p></li><li><p class="paragraph" style="text-align:left;">Allegedly Anthropic is going to release <a class="link" href="https://www.testingcatalog.com/anthropic-prepares-to-release-security-center-for-claude-code/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">“Security Center”</a> for Claude Code, scanning code for security issues.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://openai.com/index/introducing-prism?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">Introducing Prism</a> - OpenAI launched Prism, a free AI-native workspace for scientific writing that integrates GPT-5.2 directly into a cloud-based LaTeX environment.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://perplexityaimagazine.com/ai-news/openai-outcome-based-pricing-discoveries?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">OpenAI Considers Outcome-Based Pricing for AI Breakthroughs</a> - Payment would be tied to measurable results like drug discoveries or operational savings rather than just API usage or subscriptions.</p></li><li><p class="paragraph" style="text-align:left;">a16z - <a class="link" href="https://www.youtube.com/watch?v=3XVDtPU8xKE&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">The AI Opportunity that goes beyond Models</a> - I thought this was a thoughtful overview of where the opportunity is and what may be disrupted.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-313-mcp-security-hub-ide-shepherd-plaid-s-security-pipeline-as-code" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div><p class="paragraph" style="text-align:left;"></p><div style="border-top:2px solid #272A2F1A;padding:15px;"><p id="b-d054af1a-895d-476d-99b6-2c3963ef261f"><span style="font-variant-numeric:tabular-nums;text-decoration:underline;text-underline-offset:2px;">1</span>&nbsp; </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=9901f55e-c957-4dd2-be07-bb2e322e8729&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #312 - The Industrialization of Exploit Generation, macOS EDR Evasion, Hacking the AWS Console</title>
  <description>Generating 0-day exploits with Opus 4.5 and GPT-5.2, blind spots for EDRs on macOS, supply chain vuln that enabled compromising the AWS Console</description>
  <link>https://tldrsec.com/p/tldr-sec-312</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-312</guid>
  <pubDate>Thu, 22 Jan 2026 15:31:05 +0000</pubDate>
  <atom:published>2026-01-22T15:31:05Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">📸 A Year in Photos</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Over the break I did a bit of Tiago Forte’s <a class="link" href="https://www.buildingasecondbrain.com/annual-review?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Annual Review</a> program, taken from his book to be released later this year.</p><p class="paragraph" style="text-align:left;">One of the early exercises was to go through all of your photos from 2025 and pick out the top ~100 that give you the strongest emotional reaction.</p><p class="paragraph" style="text-align:left;">I don’t take a ton of photos, and I’m not generally one to review them, but I did it.</p><p class="paragraph" style="text-align:left;">And what I realized going through the photos is that there were a few newly-ish made friends, who had really been highlights of my year.</p><p class="paragraph" style="text-align:left;">So yesterday I told one of them this (shout-out Aaron), and I plan to tell the rest soon.</p><p class="paragraph" style="text-align:left;">This may sound corny, and it’s definitely not what I’ve done in the past as a certified neckbeard hacker™️, but it felt good to tell him about the positive impact he had on me, and that he’s important to me.</p><p class="paragraph" style="text-align:left;">I plan to be more intentional about taking photos like this in 2026.</p><p class="paragraph" style="text-align:left;">I wonder if there are important people in your life who may not know how much they mean to you 🤔 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Five shifts that will shape your security team in 2026</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">As we settle into 2026, AI is already top of mind for security leaders - shaping workflows, and challenging teams in unprecedented ways. On January 28<b>, </b><a class="link" href="https://www.tines.com/webinars/five-shifts-that-will-shape-your-security-team-in-2026/?utm_source=tl;drsec&utm_medium=paid_media&utm_content=newsletter-primary-2201" target="_blank" rel="noopener noreferrer nofollow">join Tines and Statascale for a live webinar</a> to get first access to insights from 1800+ practitioners and leaders, and tangible advice for turning these insights into real, practical changes for your team.</p><p class="paragraph" style="text-align:left;">You’ll learn:</p><ul><li><p class="paragraph" style="text-align:left;">What makes AI a <b>true advantage</b> for some security teams - and a burden for others</p></li><li><p class="paragraph" style="text-align:left;">What “good <b>AI governance</b>” actually looks like in practice </p></li><li><p class="paragraph" style="text-align:left;">How to turn <b>board-level attention</b> into long-term strategic influence</p></li></ul><h2 class="heading" style="text-align:center;"><b>👉</b><b> </b><a class="link" href="https://www.tines.com/webinars/five-shifts-that-will-shape-your-security-team-in-2026/?utm_source=tl;drsec&utm_medium=paid_media&utm_content=newsletter-primary-2201" target="_blank" rel="noopener noreferrer nofollow"><b>Register now!</b></a><b> </b><b>👈</b></h2></div><p class="paragraph" style="text-align:left;">I’m curious how Tines sees AI augmenting workflows, that’s big these days. Also, Semgrep uses Tines 👍️ </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://media.ccc.de/b/congress/2025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">39C3: Power Cycles</a><br>Recordings published from the 39th Chaos Communication Congress (2025). I’ve pulled out a selection of talks that look most interesting to me at the bottom of the <a class="link" href="https://tldrsec.com/p/tldr-sec-312?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console#39c3" target="_blank" rel="noopener noreferrer nofollow">web version</a> of this issue.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://whisperpair.eu/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">WhisperPair</a><br>Researchers at KU Leuven (Sayon Duttagupta, <a class="link" href="https://www.linkedin.com/in/seppe-wyns?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Seppe Wyns</a> et al) discovered WhisperPair, a vulnerability in Google Fast Pair (that enables one-tap pairing and account synchronization across supported Bluetooth accessories). The bug enables attackers to forcibly pair a vulnerable Fast Pair accessory (e.g., wireless headphones or earbuds) with an attacker-controlled device (e.g., a laptop) without user consent, allowing them to play audio at high volumes, record conversations using the microphone, or in some cases track their location. The attack succeeds within ~10 seconds and works up to 14 meters.</p><p class="paragraph" style="text-align:left;">More from Wired: <a class="link" href="https://www.wired.com/story/google-fast-pair-bluetooth-audio-accessories-vulnerability-patches/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/pulse/building-security-unlock-engineering-velocity-shreyas-sriram-deiic?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Building Security to Unlock Engineering Velocity</a><br><a class="link" href="https://www.linkedin.com/in/shreyassriram/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Shreyas Sriram</a> and <a class="link" href="https://www.linkedin.com/in/sujithktkm/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Sujith Katakam</a> describe how Robinhood&#39;s security and engineering teams built SERA (Secure Enhanced Remote Approval), a platform that enables engineers to approve access requests securely from any device without requiring VPN or corporate laptops, using passkeys and biometric authentication. The system maintains security through trusted enrollment (requiring initial setup via corporate device and VPN), device binding, risk-based controls, and comprehensive audit logging. SERA improved approval times by &gt;20% and handles &gt;25% of after-hours requests.</p></div><p class="paragraph" style="text-align:left;">💡 Great example of how security and usability can complement each other. See also <a class="link" href="https://www.youtube.com/watch?v=VXKBgsgpqqk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">my interview</a> with <a class="link" href="https://www.linkedin.com/in/leticialourenco?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Letty Lourenco</a> about how they do usable security at Netflix.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> What do AI agents and 3rd party scripts have in common?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Nobody&#39;s watching them and they both interact with your client-side environment (which is a black box in most security stacks). cside was born as an alternative to the CSP headache, automatically watching JavaScript & browser behavior at runtime to catch suspicious activity. Now our startup is building a tool to help you prepare for the millions of AI agents that will visit your website. We&#39;d love for you to try it.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://cside.com/landing/ai-agent-detection-lp?utm_source=tldrsec&utm_campaign=01-22-25" target="_blank" rel="noopener noreferrer nofollow"><b>Get Private Access</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Hm interesting, I hadn’t thought of the attack vector of client-side attacks → prompt injecting AI browsers or attacking agentic commerce. I could see securing agentic commerce being important.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloudnativedetection.substack.com/p/multi-cloud-detection-at-scale-a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Multi-Cloud Detection at Scale: A Normalization Framework</a><br><a class="link" href="https://www.linkedin.com/in/vkarthyk/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Ved K</a> describes how to build a Bronze-Silver data architecture for cloud security logs that eliminates the need to maintain separate detection rules for each cloud provider. The Bronze layer stores immutable raw logs while the Silver layer normalizes heterogeneous cloud logs (AWS CloudTrail, GCP Audit Logs, Azure Activity Logs) into unified schemas using standards like Elastic Common Schema (ECS) or Open Cybersecurity Schema Framework (OCSF), enabling you to write one detection rule that works across all providers instead of N×M provider-specific rules. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The post has some nice thoughts on schema-first detection engineering (design your schema so it’s easy to write important detections), a schema design checklist, service category abstraction, and production-grade implementation patterns.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.ryanjarv.sh/2026/01/05/unauth-aws-rosa-cluster-takeover.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Unauthenticated Cluster Takeover in AWS ROSA</a><br><a class="link" href="https://linkedin.com/in/ryanjarv?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Ryan Gerstenkorn</a> discovered a critical vulnerability in the Red Hat OpenShift Service affecting AWS ROSA Classic Clusters. The issue: the cluster transfer API failed to verify if the requester owned the cluster being transferred, allowing an unauthenticated attacker to take ownership of arbitrary clusters.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">By scanning Certificate Transparency logs for ROSA console domains, querying the unauthenticated <code>/settings/cluster</code> endpoint to extract cluster UUIDs and owner emails, and guessing usernames, attackers could initiate transfers and gain cluster-admin privileges within 24 hours. The post then walks through going from cluster admin to AWS admin within the victim’s underlying AWS account.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild</a><br>Wiz’s <a class="link" href="https://www.linkedin.com/in/yuval-avrahami-25139416b?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Yuval Avrahami</a> and <a class="link" href="https://www.linkedin.com/in/nir-ohfeld-b534b010a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Nir Ohfeld</a> describe an AWS CodeBuild misconfiguration they were able to exploit to take over key AWS GitHub repositories, including the AWS JavaScript SDK which powers the AWS Console and is present in ~66% of cloud environments. </p><p class="paragraph" style="text-align:left;">The flaw: unanchored regex patterns in ACTOR_ID webhook filters (missing <code>^</code> and <code>$</code> anchors) allowed attackers to register new GitHub user IDs containing trusted maintainer IDs as substrings, bypassing the auth check.</p><p class="paragraph" style="text-align:left;">💡 DUDE, what a bug. What I thought was especially cool is how they timed GitHub App bot user creation so that the target maintainer ID was a substring of theirs, racing all GitHub account creation. 👨‍🍳 👌 Also NBD being able to backdoor the AWS Console itself 😅 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Apple / MacOS</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.alexbeals.com/posts/reverse-engineering-ios-deeplinking-for-shortcuts?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Reverse Engineering iOS Shortcuts Deeplinks</a><br><a class="link" href="https://www.linkedin.com/in/alexbeals/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Alex Beals</a> describes his investigation into seeing if you can import or programmatically create automations—through deeplinking (TL;DR: you can’t). Alex used tools like strings, lldb, and Hopper to reverse engineer the Shortcuts app and WorkflowKit framework and discovered the full list of supported actions by examining ICManager&#39;s requestHandlers.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://chensokolovsky.github.io/FuzzerAmoreBlog/posts/ios_research_docker_env.html?_bhlid=27087bb243f0252d3cf0e2e385712dfeeb900b6d&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">iOS Research Docker Environment</a><br><a class="link" href="https://www.linkedin.com/in/chen-shalev-sokolovsky-27079843/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Chen Shalev Sokolovsky</a> shares <a class="link" href="https://github.com/chensokolovsky/iosEnv?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">iosEnv</a>, a Docker-based iOS research environment for portable and reproducible mobile security testing. The setup automates tasks like port forwarding, SSH key management, and launching debuggers/instrumentation tools (lldb, frida), and solves challenges around USB device access, password prompts, iOS symbol loading, and rootless jailbreaks.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://objective-see.org/blog/blog_0x84.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">The Mac Malware of 2025</a><br>I love <a class="link" href="https://linkedin.com/in/patrick-wardle-34580581?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Patrick Wardle</a>’s round-ups. The post is a technical deep dive of all new macOS malware discovered in 2025, organized by malware type, covering its infection vector, persistence mechanism, features and goals. He also includes sample links 👍️ Info stealers dominated the threat landscape, targeting browser data, cryptocurrency wallets, and credentials via fake applications, malvertising, and ClickFix social engineering. Many employed AppleScript/JXA for execution and avoided persistence since they exfiltrate data and exit. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Notable backdoors included ChillyHell (a modular implant with password cracking capabilities), FlexibleFerret (DPRK-linked Go backdoor delivered via fake job assessments), and a sophisticated BlueNoroff campaign deploying multiple components including a Nim-based persistent loader, Go backdoor, process injector, keylogger, and cryptocurrency stealer. The year saw increased sophistication through multi-stage infection chains, dead drop resolvers for C2 discovery, hardware-based anti-VM checks (like ARM CPU feature validation), and abuse of signed/notarized binaries.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://oliviagallucci.com/edr-evasion-with-lesser-known-languages-macos-apis?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">EDR Evasion with Lesser-Known Languages & macOS APIs</a><br>Excellently detailed post by my friend <a class="link" href="https://www.linkedin.com/in/olivia-gallucci?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Olivia Gallucci</a> on the nuances of EDRs on macOS, focusing on technical detection gaps and platform limitations. macOS malware written in Nim, Go, and Rust can often evade EDRs, because while these languages ultimately call the same macOS APIs, they produce large statically-linked Mach-O binaries with unusual section layouts that bypass signature-based detection, and their custom runtimes can avoid standard library hooks that EDRs monitor. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Apple&#39;s Endpoint Security API provides some event visibility to EDRs, but there are still blind spots: third-party tools cannot read process memory (blocking detection of in-memory payloads), cannot access unified logging without private entitlements, and are limited to file-system and behavior-centric detection. Many EDRs rely heavily on enforcing Apple&#39;s native mechanisms (Gatekeeper, XProtect, TCC) rather than implementing novel detection logic.</p></div><p class="paragraph" style="text-align:left;">💡 Tons of details and supporting reference links, love it!</p><p class="paragraph" style="text-align:left;"></p><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/tracebit-com/awesome-deception?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">tracebit-com/awesome-deception</a><br>By <a class="link" href="https://www.linkedin.com/company/tracebit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Tracebit</a>: An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://kostas-ts.medium.com/detectionstream-introducing-the-sigma-training-platform-574721f18f45?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">DetectionStream: Introducing the Sigma Training Platform</a><br><a class="link" href="https://www.linkedin.com/in/kostastsale/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Kostas Tsialemis</a> introduces the Sigma Playground&#39;s new <a class="link" href="https://detectionstream.com/sigma/training?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Training Platform</a>, a gamified environment for learning detection engineering through hands-on practice with over 20 real-world challenges using event logs from EVTX-ATTACK-SAMPLES. The platform features interactive challenges, real-time rule evaluation, a progressive hint system, difficulty levels, and a community leaderboard, all while keeping user data private by running client-side. Users can also create and share their own challenges through the Challenge Builder.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@0xOZ/how-to-get-scammed-by-dprk-hackers-b2f7588aea76?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">How to Get Scammed (by DPRK Hackers)</a><br>OZ describes their experience with a DPRK-linked malware campaign (DEV#POPPER/XCTDH/Contagious Interview) that uses fake job interviews to target developers. OZ describes the interactions with the “recruiter,” along with sketchy signs like the person deleting messages, GitHub repos, etc.</p><p class="paragraph" style="text-align:left;">The campaign used a novel blockchain-based dead drop architecture where Tron and Aptos wallets serve as pointers to XOR-encrypted payloads hosted on Binance Smart Chain transactions. Using Docker and pspy for dynamic analysis, OZ traced the infection chain from obfuscated JavaScript through LCG-based deobfuscation to final payloads that inject persistence into VS Code/Cursor IDEs and establish <a class="link" href="https://Socket.IO?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Socket.IO</a> C2 connections. The malware includes a ReDoS-based debugger detection trick (if someone’s stepping through code with a debugger, the regex catastrophically backtraces and hangs), and deploys sandbox evasion techniques that detect AWS/Azure/Docker/Kali environments before executing.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.securitybreak.io/coding-agents-the-insider-threat-you-installed-yourself-35644a1d5409?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Coding Agents. The Insider Threat You Installed Yourself</a><br><a class="link" href="https://www.linkedin.com/in/thomas-roccia?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Thomas Roccia</a> describes how to build visibility and security monitoring for AI coding agents like Claude Code using hooks and his new open-source tool <a class="link" href="https://github.com/fr0gger/nova-claude-code-protector?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">NOVA Protector</a>. Claude Code&#39;s hook system (PreToolUse, PostToolUse, UserPromptSubmit, etc.) allows intercepting agent actions before/after execution, which NOVA Protector leverages to trace all file reads, command executions, MCP server calls, and agent skill invocations into JSONL session logs. NOVA Protector automatically generates HTML reports for each session showing metrics like files accessed, commands run, prompt injection detection results, tool usage statistics, and complete execution timelines.</p><p class="paragraph" style="text-align:left;">The tool integrates with the <a class="link" href="https://github.com/fr0gger/nova-framework?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">NOVA Framework</a>&#39;s adversarial prompt detection capabilities, scanning agent inputs/outputs against configurable rules for instruction override, roleplay jailbreak, encoding obfuscation, and context manipulation attacks.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">On the Coming Industrialisation of Exploit Generation with LLMs</a><br><a class="link" href="https://x.com/seanhn?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Sean Heelan</a> built agents using Opus 4.5 and GPT-5.2 that successfully wrote over 40 distinct exploits for a zero-day QuickJS vulnerability across 6 scenarios with modern mitigations enabled (ASLR, NX, full RELRO, fine-grained CFI, shadow-stack, seccomp), with GPT-5.2 solving all challenges including a particularly difficult one requiring a 7-function-call chain through glibc&#39;s exit handler mechanism. Most exploits were generated in under an hour for around $30-50. The key: the LLM needs to be able to search the solution space automatically with no human intervention, and have some way to verify its solution. Tons of great additional technical details, results, and more in this <a class="link" href="https://github.com/SeanHeelan/anamnesis-release?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">GitHub repo</a>.</p><p class="paragraph" style="text-align:left;">“We should start assuming that in the near future the limiting factor on a state or group’s ability to develop exploits, break into networks, escalate privileges and remain in those networks, is going to be their token throughput over time, and not the number of hackers they employ.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cset.georgetown.edu/article/ai-and-the-software-vulnerability-lifecycle?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">AI and the Software Vulnerability Lifecycle</a><br><a class="link" href="https://www.linkedin.com/in/chrisrohlf/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Chris Rohlf</a> discusses how AI is transforming the software vulnerability lifecycle across three key phases: discovery, patching, and exploitation. He explains how LLMs integrated with traditional security tools like fuzzers and static analyzers can automate vulnerability discovery, the challenges in generating fixes that address root causes rather than just specific exploit vectors, and how models can offer uplift and efficiency gains in exploitation by identifying which existing program components to leverage or by generating testing infrastructure to incrementally refine an exploit.</p><p class="paragraph" style="text-align:left;">💡 This post is a great overview of these spaces, and does a good job covering some of the nuances and challenges. Great resource to share with leadership/executives.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://secure.dev/files/AI_Cyber_and_National_Security.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">AI, Cyber and National Security</a><br>Presentation by <a class="link" href="https://www.linkedin.com/in/chrisrohlf/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Chris Rohlf</a> discussing: how AI could potentially disrupt the current attacker-defender asymmetry by helping defenders with scale, efficiency, and automation, and an overview of applying AI to security, AI code generation, program analysis, and securing AI/AI compute/AI agents. Future predictions: AI will give defenders an advantage (→ cyber as SIGINT capability for nation states is significantly reduced), great powers fight for AI supremacy, and accelerated feedback loops put all nations but the top few in a distant AI third place.</p><p class="paragraph" style="text-align:left;"></p></div><div id="39c3" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">39C3 (CCC 2025)</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Some talks that look especially interesting to me:</p><p class="paragraph" style="text-align:left;">Politics / Privacy</p><ul><li><p class="paragraph" style="text-align:left;">Cory Doctorow - <a class="link" href="https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">A post-American, enshittification-resistant internet</a></p></li><li><p class="paragraph" style="text-align:left;">Katika Kühnreich - <a class="link" href="https://media.ccc.de/v/39c3-all-sorted-by-machines-of-loving-grace-ai-cybernetics-and-fascism-and-how-to-intervene?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">All Sorted by Machines of Loving Grace? &quot;AI&quot;, Cybernetics, and Fascism and how to Intervene</a></p></li><li><p class="paragraph" style="text-align:left;">Jade Sheffey - <a class="link" href="https://media.ccc.de/v/39c3-a-tale-of-two-leaks-how-hackers-breached-the-great?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">A Tale of Two Leaks: How Hackers Breached the Great Firewall of China</a></p></li><li><p class="paragraph" style="text-align:left;">Svea Windwehr and Chloé Berthélémy - <a class="link" href="https://media.ccc.de/v/39c3-the-last-of-us-fighting-the-eu-surveillance-law-apocalypse?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">The Last of Us - Fighting the EU Surveillance Law Apocalypse</a></p></li><li><p class="paragraph" style="text-align:left;">Helena Nikonole - <a class="link" href="https://media.ccc.de/v/39c3-coding-dissent-art-technology-and-tactical-media?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Coding Dissent: Art, Technology, and Tactical Media</a></p></li><li><p class="paragraph" style="text-align:left;">mixy1, Luke Bjorn Scerri and girogio - <a class="link" href="https://media.ccc.de/v/39c3-there-is-no-way-we-ended-up-getting-arrested-for-this-malta-edition?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">There is NO WAY we ended up getting arrested for this (Malta edition)</a></p></li></ul><p class="paragraph" style="text-align:left;">Fuzzing</p><ul><li><p class="paragraph" style="text-align:left;">Addison - <a class="link" href="https://media.ccc.de/v/39c3-demystifying-fuzzer-behaviour?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Demystifying Fuzzer Behaviour</a></p></li><li><p class="paragraph" style="text-align:left;">Romain Malmain - <a class="link" href="https://media.ccc.de/v/39c3-build-a-fake-phone-find-real-bugs-qualcomm-gpu-emulation-and-fuzzing-with-libafl-qemu?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Build a Fake Phone, Find Real Bugs Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU</a></p></li></ul><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">Johann Rehberger - <a class="link" href="https://media.ccc.de/v/39c3-agentic-probllms-exploiting-ai-computer-use-and-coding-agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents</a></p></li><li><p class="paragraph" style="text-align:left;">Udbhav Tiwari and Meredith Whittaker - <a class="link" href="https://media.ccc.de/v/39c3-ai-agent-ai-spy?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">AI Agent, AI Spy</a></p></li><li><p class="paragraph" style="text-align:left;">Mathias Schindler - <a class="link" href="https://media.ccc.de/v/39c3-ai-generated-content-in-wikipedia-a-tale-of-caution?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">AI-generated content in Wikipedia - a tale of caution</a></p></li><li><p class="paragraph" style="text-align:left;">Leo Meyerovich and Sindre Breda - <a class="link" href="https://media.ccc.de/v/39c3-breaking-bots-cheating-at-blue-team-ctfs-with-ai-speed-runs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Breaking BOTS: Cheating at Blue Team CTFs with AI Speed-Runs</a></p></li><li><p class="paragraph" style="text-align:left;">Shipei Qu, Zikai Xu and Xuangan Xiao - <a class="link" href="https://media.ccc.de/v/39c3-skynet-starter-kit-from-embodied-ai-jailbreak-to-remote-takeover-of-humanoid-robots?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Skynet Starter Kit From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots</a></p></li><li><p class="paragraph" style="text-align:left;">Chiao-Lin Yu (Steven Meow) - <a class="link" href="https://media.ccc.de/v/39c3-when-vibe-scammers-met-vibe-hackers-pwning-phaas-with-their-own-weapons?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">When Vibe Scammers Met Vibe Hackers: Pwning PhaaS with Their Own Weapons</a></p></li><li><p class="paragraph" style="text-align:left;">Ting-Chun Liu and Leon-Etienne Kühr - <a class="link" href="https://media.ccc.de/v/39c3-51-ways-to-spell-the-image-giraffe-the-hidden-politics-of-token-languages-in-generative-ai?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">51 Ways to Spell the Image Giraffe: The Hidden Politics of Token Languages in Generative AI</a></p></li><li><p class="paragraph" style="text-align:left;">jiawen uffline - <a class="link" href="https://media.ccc.de/v/39c3-a-media-almost-archaeology-on-data-that-is-too-dirty-for-ai?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">a media-almost-archaeology on data that is too dirty for &quot;AI&quot;</a></p></li><li><p class="paragraph" style="text-align:left;">Dennis Özcelik - <a class="link" href="https://media.ccc.de/v/39c3-developing-new-medicines-in-the-age-of-ai-and-personalized-medicine?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Developing New Medicines in the Age of AI and Personalized Medicine</a></p></li></ul><p class="paragraph" style="text-align:left;">Security</p><ul><li><p class="paragraph" style="text-align:left;">ilja and Michael Smith - <a class="link" href="https://media.ccc.de/v/39c3-escaping-containment-a-security-analysis-of-freebsd-jails?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Escaping Containment: A Security Analysis of FreeBSD Jails</a></p></li><li><p class="paragraph" style="text-align:left;">breakingbread - <a class="link" href="https://media.ccc.de/v/39c3-prometheus-reverse-engineering-overwatch?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Prometheus: Reverse-Engineering Overwatch</a></p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cursor.com/blog/scaling-agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Scaling long-running autonomous coding</a> - Cursor did an experiment where their coding agents built a web browser from scratch by running autonomously for a week and generating 1M+ lines of code across 1,000 files.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://embedding-shapes.github.io/cursor-implied-success-without-evidence/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Cursor&#39;s latest &quot;browser experiment&quot; implied success without evidence</a> - Someone looked into the browser’s code and found many GitHub Actions runs failed, few commits compiled cleanly. This <a class="link" href="https://github.com/wilsonzlin/fastrender/issues/98?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console#issuecomment-3761559718" target="_blank" rel="noopener noreferrer nofollow">GitHub issue</a> has more discussion and shows the browser partially rendering Wikipedia. Also Simon Willison <a class="link" href="https://simonwillison.net/2026/Jan/19/scaling-long-running-autonomous-coding?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">weighs in</a>.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.getagentcraft.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Agent Craft</a> by <a class="link" href="https://www.linkedin.com/in/ido-salomon/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Ido Salomon</a> - Manage your agents and subagents using an RTS (like Warcraft) interface. I don’t know if this is actually useful it looks awesome 😂 H/T my friend <a class="link" href="https://linkedin.com/in/robragan?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Rob Ragan</a> who is always sharing great stuff.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://vibecraft.sh/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Vibecraft</a> - a 3D app to watch and manage Claude Code instances (<a class="link" href="https://github.com/Nearcyan/vibecraft?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>).</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://simonwillison.net/2025/Dec/25/claude-code-transcripts/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">claude-code-transcripts</a> by Simon Willison - A new Python CLI tool for converting Claude Code (and web) transcripts to HTML pages for understanding what Claude has done.</p></li><li><p class="paragraph" style="text-align:left;">Caleb Sima’s <a class="link" href="https://www.linkedin.com/posts/calebsima_due-to-popular-demand-here-is-my-%F0%9D%97%96%F0%9D%97%BC%F0%9D%97%B1%F0%9D%97%B6-share-7417371884582780928-gi42/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Coding Agent Stack</a> - Claude Code, <a class="link" href="https://github.com/obra/superpowers?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Claude Superpowers</a>, <a class="link" href="https://github.com/obra/episodic-memory?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Episodic Memory</a>, <a class="link" href="https://github.com/upstash/context7?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Context7 MCP</a>. </p><ul><li><p class="paragraph" style="text-align:left;">Tier 2: <a class="link" href="https://github.com/SuperClaude-Org/SuperClaude_Framework?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">SuperClaude</a>, Firecrawl, Browserbase, Playwright, Typescript-lsp, Hookify. </p></li></ul></li><li><p class="paragraph" style="text-align:left;">X has released the <a class="link" href="https://github.com/xai-org/x-algorithm?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">x-algorithm</a> on GitHub that powers the For You feed. It combines in-network content (from accounts you follow) with out-of-network content (discovered through ML-based retrieval) and ranks everything using a Grok-based transformer model. </p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Privacy</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://justthebrowser.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Just the Browser</a> - Helps you remove AI features, telemetry data reporting, sponsored content, product integrations, and other annoyances from desktop web browsers.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.punkt.ch/blogs/news/punkt-unveils-mc03?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Punkt MC03</a>, a privacy-focused smart phone.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/iAnonymous3000/iOS-Hardening-Guide?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">iOS-Hardening-Guide</a> - A comprehensive guide for enhancing security and privacy on iOS and iPadOS devices, by <a class="link" href="https://www.linkedin.com/in/soorajsathyanarayanan/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Sooraj Sathyanarayanan</a>.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://micahflee.com/practical-defenses-against-technofascism?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Practical Defenses Against Technofascism</a> - Blog post version of <a class="link" href="https://www.linkedin.com/in/micahflee/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Micah Lee</a>’s BSidesPDX keynote. </p><ul><li><p class="paragraph" style="text-align:left;">Always apply updates, use Lockdown Mode, enable Advanced Data Protection in your iCloud account, and advice on device searches. </p></li><li><p class="paragraph" style="text-align:left;">Enable disk encryption and consider powering off devices before going through security checkpoints or if you’re in a situation where someone may examine your phone. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://efforg.github.io/rayhunter/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">Rayhunter</a> is open-source custom firmware for cheap mobile hotspots that can detect cell-site simulators.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Politics</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.washingtonpost.com/national-security/2026/01/14/washington-post-reporter-search/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">FBI executes search warrant at Washington Post reporter’s home</a> as a part of an investigation into classified leaks. In April, Bondi <a class="link" href="https://www.washingtonpost.com/national-security/2025/04/25/justice-leak-investigations-reporters-email-phone-records-bondi/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">rescinded a Biden-era policy</a> that prevented officials from searching reporters’ phone records when trying to identify government personnel who have provided sensitive information to news organizations.</p></li><li><p class="paragraph" style="text-align:left;">In Trump’s first term, the administration tried to <a class="link" href="https://archive.is/B3L7c?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">obtain phone and email records to identify sources</a>.</p></li><li><p class="paragraph" style="text-align:left;">Jerome Powell served under President Bush Sr., Obama, Biden, and Trump. In an <a class="link" href="https://www.federalreserve.gov/newsevents/speech/powell20260111a.htm?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">unprecedented statement</a>: “The threat of criminal charges is a consequence of the Federal Reserve setting interest rates based on our best assessment of what will serve the public, rather than following the preferences of the President. This is about whether the Fed will be able to continue to set interest rates based on evidence and economic conditions—or whether instead monetary policy will be directed by political pressure or intimidation.“</p></li><li><p class="paragraph" style="text-align:left;">Senator Thom Tillis (R-NC), a member of the Senate Banking Committee, <a class="link" href="https://www.tillis.senate.gov/2026/1/tillis-statement-on-federal-reserve-nominations?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">statement</a>: “If there were any remaining doubt whether advisers within the Trump Administration are actively pushing to end the independence of the Federal Reserve, there should now be none. It is now the independence and credibility of the Department of Justice that are in question.”</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-312-the-industrialization-of-exploit-generation-macos-edr-evasion-hacking-the-aws-console" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=e7e2279c-0fdc-41b4-879e-3379549e6506&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #311 - Slack&#39;s Security Agents, Cloud-Native Detection Engineering, Trail of Bits&#39; Claude Skills</title>
  <description>Slack&#39;s AI agent system to optimize security alert investigations, deep dive into cloud-native detection engineering, ToB&#39;s open source Skills for security research, vulnerability detection, and audit workflows </description>
  <link>https://tldrsec.com/p/tldr-sec-311</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-311</guid>
  <pubDate>Thu, 15 Jan 2026 15:30:24 +0000</pubDate>
  <atom:published>2026-01-15T15:30:24Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🤙 Mahalo for Reading</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">A few tidbits from Hawaii:</p><ul><li><p class="paragraph" style="text-align:left;">Sunsets have been beautiful, and the nature is stunning. If you visit O’ahu, you’ve got to try the malasadas from Leonard’s Bakery 🤤 </p></li><li><p class="paragraph" style="text-align:left;">My mom taught me to never waste food, so when consolidating my food carry-ons in the airport, I peeled an entire bag of lychee over a drinking fountain and put them in a water bottle to take up less space. Making my mom proud.</p></li><li><p class="paragraph" style="text-align:left;">Maui appears to have banned non-mineral sunscreen, which has somehow managed to make me look even more white. I’m living in my ghost era.</p></li><li><p class="paragraph" style="text-align:left;">The road to Hana is notoriously windy so I was driving fairly slowly. A car was tailgating me, and I guess I took too long to pull over, because in a brief straight stretch it blazed past me, and the driver put his hand out the window and flipped me the bird 😂 </p><ul><li><p class="paragraph" style="text-align:left;">I think I have unlocked the raw achievement of being flipped off by one of the notoriously relaxed Hawaiians.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h2 class="heading" style="text-align:center;">📣<b> </b><b>Secure, Govern, and Operate AI at Engineering Scale</b></h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Modern AI infrastructure outgrows traditional access and security models. Whether you&#39;re running GPU training clusters or deploying digital twins that autonomously interact with infrastructure, you can&#39;t rely on static credentials.</p><p class="paragraph" style="text-align:left;">Teleport treats every actor — agents, LLM tools, bots, MCP tools, and digital twins — as a first-class identity. This turns agentic AI from “uncontrolled automation” into trustworthy, governed automation, delivering the identity, access, and security foundation your AI environment demands.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://goteleport.com/platform/ai-infrastructure/?&utm_content=webpage&utm_medium=newsletter&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>Secure Your AI Infrastructure</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">When agents can access sensitive data and perform state-changing actions, knowing which agent did what, and being able to do meaningful access control, is very important. I believe fundamentals like identity and access management are going to <i>more</i> important in an AI-heavy world. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/MegaManSec/Gixy-Next?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">MegaManSec/Gixy-Next</a><br>By <a class="link" href="https://www.linkedin.com/in/joshua-alexander-rogers?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Joshua Rogers</a>: An actively maintained fork of Yandex&#39;s Gixy that statically analyzes nginx.conf files to detect security misconfigurations, hardening gaps, and performance issues. It detects issues like HTTP splitting, SSRF, host spoofing, path traversal, alias traversal, and more.</p><p class="paragraph" style="text-align:left;">See also <a class="link" href="https://github.com/dvershinin/gixy?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">dvershinin/gixy</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Clang Hardening Cheat Sheet - Ten Years Later</a><br>Daniel Janson and <a class="link" href="https://www.linkedin.com/in/beatricecreusillet/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Béatrice Creusillet</a> provide an update to Quarkslab’s 2016 Clang Hardening Cheat Sheet, covering additional hardening options recommended by the OpenSSF, as well as more specialized options that mitigate newer classes of exploits. Including: general protections when using the standard C/C++ libraries or loading libraries, mitigations against stack-based memory corruption, defenses against code reuse attacks like Return-Oriented Programming (ROP) or Jump-Oriented Programming (JOP) attacks, as well as defenses against speculative execution attacks.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.dnsimple.com/2025/11/managing-repositories-terraform-github?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">How We Scaled Code Repository Management at DNSimple</a><br><a class="link" href="https://www.linkedin.com/in/weppos?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Simone Carletti</a> describes how DNSimple went from manually managing GitHub repositories to a fully automated Terraform-based system that automatically runs <code>terraform plan</code> on pull requests and <code>terraform apply</code> on merge. They structure GitHub repositories as Terraform map variables with topics for categorization (language, team ownership, policies), manage templates and CODEOWNERS files as github_repository_file resources, and more. The system now manages hundreds of repos with centralized permissions, full Git history for rollbacks, and enables bulk changes across all repos by modifying a single template file.</p><p class="paragraph" style="text-align:left;">💡 I like this a lot - git history of all repo changes, roll out new security policies/secure defaults to all repos in one place, strong asset inventory fundamentals (which repos does the platform team maintain? What Go projects do we have? Which repos have vulnerability alerts enabled?).</p><p class="paragraph" style="text-align:left;">See also, as previously included in <i>tl;dr sec</i>: <a class="link" href="https://blog.cloudflare.com/terraforming-cloudflare-at-cloudflare/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">How Cloudflare uses Terraform to manage Cloudflare</a>.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> The security platform that ships with your code</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Arcjet adds security controls directly into your application code. Protect APIs and endpoints from abuse with rate limiting, bot detection, and request validation, without proxies, IP allowlists, or complex infrastructure.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://arcjet.com/?utm_source=tldrsec&utm_medium=email&utm_campaign=2026-01-15" target="_blank" rel="noopener noreferrer nofollow"><b>Learn More</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Making secure defaults easy and developer friendly is 👌 in my book! Arcjet also has <a class="link" href="https://github.com/arcjet/arcjet-js?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">open source SDKs</a> so you can give it a try for free.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloudsecurityalliance.org/blog/2026/01/05/aws-ends-sse-c-encryption-and-a-ransomware-vector?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">AWS Ends SSE-C Encryption, and a Ransomware Vector</a><br><a class="link" href="https://linkedin.com/in/richmogull?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Rich Mogull</a> gives an overview of “Server Side Encryption- Customer-provided keys,” why it’s good that AWS is deprecating it, how attackers were using it for ransomware, and alternatives to consider if you’re one of the few people using it.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/DenizParlak/heimdall?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">DenizParlak/heimdall</a><br>By <a class="link" href="https://www.linkedin.com/in/denizparlak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Deniz Parlak</a>: An AWS security scanner that discovers privilege escalation paths across 10+ AWS services, featuring 50+ IAM privilege escalation patterns and 85+ attack chain patterns with MITRE ATT&CK mapping. Heimdall detects both direct and multi-hop attack paths (EC2, RDS, S3, Lambda, KMS, Secrets Manager, STS, SNS, SQS, DynamoDB).</p><p class="paragraph" style="text-align:left;">💡 Note: not sure how much of this is just vibed, but including for AWS privilege escalation tool completeness.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloudnativedetection.substack.com/p/the-cloud-native-detection-engineering?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">The Cloud-Native Detection Engineering Handbook</a><br><a class="link" href="https://www.linkedin.com/in/vkarthyk/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Ved K</a> walks through a thorough detection engineering lifecycle for cloud environments, covering nine phases from threat research to continuous improvement. The post describes how to prioritize TTPs using exploitability/risk/ROI scoring, validate telemetry coverage, and implement a three-tier data architecture (Bronze/Silver/Gold) using ECS or OCSF normalization to write cloud-agnostic detections once instead of maintaining provider-specific rules for GCP/AWS/Azure, and more.</p><p class="paragraph" style="text-align:left;">💡 Tons of detail, great resource 👍️ </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/12fc1be0-5f55-4090-88ed-39fb64295fd6/image.png?t=1768458649"/></div><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/xorhex/BinYars?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">xorhex/BinYars</a><br>By <a class="link" href="https://infosec.exchange/@xorhex?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">@xorhex</a>: A Binary Ninja Plugin that integrates YARA-X into Binary Ninja.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://eversinc33.com/2024/03/23/anti-anti-rootkit-techniques-part-i-unkovering-mapped-rootkits?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">(Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits</a><br><a class="link" href="https://www.linkedin.com/in/sven-rath-4212ba1b8?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Sven Rath</a> (<a class="link" href="https://x.com/eversinc33?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">@eversinc33</a>) discusses manual driver mapping (writing your malware into kernel space), and three rootkit detection techniques, including scanning device objects in the Windows Object Manager for DriverEntry pointers to unbacked memory regions, queuing an APC to all system threads to identify stack frames pointing to unmapped memory, and leveraging Non-Maskable Interrupts (NMIs) to hopefully catch a rootkit thread running on a CPU by walking the stack to find unbacked memory pointers.</p><p class="paragraph" style="text-align:left;">To test these detection strategies and related evasions, Sven developed <a class="link" href="https://github.com/eversinc33/unKover?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">unKover</a>, a Windows anti-rootkit/anti-cheat driver that can detect drivers mapped to kernel memory.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://research.checkpoint.com/2025/gachiloader-node-js-malware-with-api-tracing/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">GachiLoader: Defeating Node.js Malware with API Tracing</a><br>Check Point’s <a class="link" href="https://www.linkedin.com/in/sven-rath-4212ba1b8?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Sven Rath</a> and <a class="link" href="https://www.linkedin.com/in/jaromirhorejsi?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Jaromir Horejsi</a> describe GachiLoader, an obfuscated Node.js malware distributed via the YouTube Ghost Network, a network of compromised YouTube accounts promoting fake game cheats and cracked software. They released <a class="link" href="https://github.com/CheckPointSW/Nodejs-Tracer?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Nodejs-Tracer</a>, a tracer for Node.js scripts to dynamically analyze NodeJS malware, defeat common anti-analysis tricks and significantly reduce manual analysis effort.</p><p class="paragraph" style="text-align:left;">Some of the GachiLoader variants drop a second-stage loader implementing &quot;Vectored Overloading,&quot; a novel PE injection technique that tricks the Windows loader into loading a malicious PE from memory instead of a legitimate DLL. <a class="link" href="https://github.com/CheckPointSW/VectoredOverloading?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Proof-of-concept here</a>.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.zsec.uk/capd?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Making CloudFlare Workers Work for Red Teams</a><br><a class="link" href="https://www.linkedin.com/in/norecruiters?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Andy Gill</a> describes using CloudFlare Workers and Pages to create a Conditional Access Payload Delivery (CAPD) system that serves files only when requests include a valid pre-shared authorization header, returning generic 503 errors otherwise. This way red teams can serve payloads to targets without detection. </p><p class="paragraph" style="text-align:left;">Andy shares a number of potential improvements (multiple campaigns, rotating payloads) and detection opportunities (monitoring for unusual authorization headers to *.<a class="link" href="https://pages.dev?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">pages.dev</a> domains in proxy logs, non-browser processes connecting to CloudFlare infrastructure, binary content types from static hosting platforms, etc.).</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://labs.jumpsec.com/tokenflare-serverless-AiTM-phishing-in-under-60-seconds?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">TokenFlare: Serverless AiTM Phishing in Under 60 Seconds</a><br>JUMPSEC’s <a class="link" href="https://www.linkedin.com/in/gladstomych/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Sunny Chau</a> announces <a class="link" href="https://github.com/JumpsecLabs/TokenFlare?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">TokenFlare</a>, an open-source serverless Adversary-in-the-Middle (AiTM) phishing framework for Entra ID/M365 that deploys working infrastructure in under a minute using CloudFlare Workers. “Working AiTM infrastructure, with SSL, bot protection, and credential capture to your webhook of choice.” It supports Conditional Access Policy bypasses via User-Agent spoofing, and includes built-in bot blocking based on real-world campaign data.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/zoicware/RemoveWindowsAI?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">zoicware/RemoveWindowsAI</a> - Force remove Copilot, Recall and more in Windows 11.</p></li><li><p class="paragraph" style="text-align:left;">Part 1 of <a class="link" href="https://www.linkedin.com/in/pramod-gosavi-b32a71?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Pramod Gosavi</a>’s <a class="link" href="https://www.linkedin.com/pulse/ai-soc-episode-1-death-centralized-siem-security-analysis-gosavi-vmlnc/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">reflections on AI in SOC</a>, covering companies and market dynamics from SIEM 1.0 to what may happen in SIEM 3.0</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.prophetsecurity.ai/blog/rethinking-soc-capacity-how-ai-changes-the-human-cost-curve?utm_campaign=34955888-TLDR%20Sec_Sponsored%20Link_01_15_2026&utm_source=tldr_sec&utm_medium=newsletter%20sponsorship&utm_content=sponsored%20link" target="_blank" rel="noopener noreferrer nofollow">Rethinking SOC Capacity: How AI Changes the Human Cost Curve</a><b> - </b>Traditional SOC scaling is broken: increasing alert volume requires increasing headcount, creating a &quot;Human Cost Curve&quot; that eventually breaks under the weight of modern-scale threats. In this post Prophet Security breaks down the math: how analysts only have ~5.6 investigation hours/day, and how AI decouples capacity from headcount.*</p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/trailofbits/skills?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">trailofbits/skills</a><br><a class="link" href="https://linkedin.com/company/trail-of-bits?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Trail of Bits</a>’ Claude Code skills for security research, vulnerability detection, and audit workflows 🔥 Some neat skills around: verifying fix commits address findings without introducing bugs, building deep architectural context, doing a security-focused differential review of code changes, performing static analysis with CodeQL or Semgrep, a Semgrep rule creator, variant analysis (finding similar vulnerabilities across codebases), and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://danielmiessler.com/blog/personal-ai-maturity-model?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">A Personal AI Maturity Model (PAIMM)</a><br>Cool post by <a class="link" href="https://www.linkedin.com/in/danielmiessler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Daniel Miessler</a> sharing a 9-level maturity model for AI evolution from Chatbots (Tiers 1-3) to Agents (Tiers 4-6) to Assistants (Tiers 7-9), tracking progression across 6 dimensions: context, personality, tool use, awareness, proactivity, and multitask scale. </p><p class="paragraph" style="text-align:left;">Some of Daniel’s predictions: there will be a shift with Assistants in being reactive to proactively helping you, they’ll continuously monitor your state, advocate for you, and help you achieve your goals, voice will overtake typing as the primary interface, they’ll have access to cameras/audio to have full visibility into your state, and more. I like the vignette section on what this might look like across protecting you and your loved ones, detecting and filtering influence campaigns, work, monitoring your mental state and energy, etc.</p><p class="paragraph" style="text-align:left;">💡 For a deep dive into Daniel’s personal AI setup and how to build your own, see <a class="link" href="https://semgrep.dev/events/video-library/?title=building-your-personal-ai-infrastructure-with-daniel-miessler&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">this webinar</a> we did together and his <a class="link" href="https://drive.google.com/file/d/10XSzX18242IRg4kpbebxISVvUsh6Y3LT/view?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">slides here</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://slack.engineering/streamlining-security-investigations-with-agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Streamlining Security Investigations with Agents</a><br><a class="link" href="https://www.linkedin.com/in/dominic-marks-b5a959396?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Dominic Marks</a> describes how Slack&#39;s Security Engineering team has developed an AI agent system to optimize security alert investigations. Their initial prototype was a simple prompt + coding agent CLI + MCPs to various systems, but they now have a structured multi-agent approach. The system employs three persona categories (Director, Expert, and Critic agents) working in a coordinated investigation loop across multiple phases (Discovery, Trace, and Conclude), with each agent performing specific tasks (Access, Cloud, Code, and Threat experts). Each agent/task pair is modeled with a carefully defined structured output, and the application orchestrates the model invocations, propagating just the right context at each stage.</p><p class="paragraph" style="text-align:left;">Their architecture includes a Hub for API and storage, Workers for processing investigations, and a Dashboard for real-time monitoring. The post walks through an interesting example of the agent identifying a credential exposure that wasn’t the focus of the current investigation.</p><p class="paragraph" style="text-align:left;">💡 Great AI + security engineering post, thoughtful and useful architectural details, highly recommend 👍️ </p><p class="paragraph" style="text-align:left;"></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/422c25b6-c605-47ad-b2ed-6af0b60544c7/image.png?t=1768443943"/></div><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Feelz</p><ul><li><p class="paragraph" style="text-align:left;">Scott Galloway’s <a class="link" href="https://www.profgmarkets.com/p/how-important-is-money-to-being-a-man-e13a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">newsletter issue</a> commenting on his recent book Notes on Being a Man.</p></li><li><p class="paragraph" style="text-align:left;">Jason Chen - <a class="link" href="https://www.youtube.com/watch?v=6kfvM1YNXKo&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Luckiest Man in the World</a> 🥹😭 </p></li><li><p class="paragraph" style="text-align:left;">Aella - <a class="link" href="https://aella.substack.com/p/bye-mom?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">bye, mom</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Privacy</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/inside-ices-tool-to-monitor-phones-in-entire-neighborhoods?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Inside ICE’s Tool to Monitor Phones in Entire Neighborhoods</a> - 404 Media has obtained material that explains how Tangles and Webloc, two surveillance systems ICE recently purchased, work. Webloc can track phones without a warrant and follow their owners home or to their employer. How: 1) location data from apps on your phone that sell your data to brokers as well as 2) ads. By buying the data, ICE and others can use it without a warrant and without judicial oversight.</p></li><li><p class="paragraph" style="text-align:left;">Wired - <a class="link" href="https://www.wired.com/story/how-to-protest-safely-surveillance-digital-privacy/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">How to Protest Safely in the Age of Surveillance</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://privacy.ca.gov/drop/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">California Delete Request and Opt-out Platform (DROP)</a> - Submit a single deletion request to 500+ registered data brokers instead of opting out individually with each company.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/torvalds/AudioNoise/commit/93a72563cba609a414297b558cb46ddd3ce9d6b5?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">Linus Torvalds is using Antigravity</a></p></li><li><p class="paragraph" style="text-align:left;">r/cybersecurity - <a class="link" href="https://www.reddit.com/r/cybersecurity/comments/1qcbufo/whats_the_most_expensive_security_control_youve/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">What’s the most expensive security control you’ve seen that added zero security?</a></p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-311-slack-s-security-agents-cloud-native-detection-engineering-trail-of-bits-claude-skills" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=155610db-4cfe-43c0-ac07-17549e6b9be8&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #310 - Vulnerable MCP Labs, Pathfinding.cloud, Prompt Injection Taxonomy</title>
  <description>9 vulnerable MCP servers to learn how to pen test AI agent infra, a knowledge base of 65+ AWS IAM privilege escalation paths, Jason Haddix&#39;s open-source classification system for LLM prompt injection attacks</description>
  <link>https://tldrsec.com/p/tldr-sec-310</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-310</guid>
  <pubDate>Thu, 08 Jan 2026 15:30:45 +0000</pubDate>
  <atom:published>2026-01-08T15:30:45Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🏖️ Aloha</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">I hope you had an awesome holiday break and great start to the new year!</p><p class="paragraph" style="text-align:left;">I spent a few weeks with my family in the Midwest, where I survived the cold despite my now frail Californian temperament, hit the gym with my brother, and took a boxing class taught by my sister.</p><p class="paragraph" style="text-align:left;">We also did a Wicked movie day, where we watched part 1 in the morning then immediately went to a Part 2 matinee. My mom was hopped up on espresso so she couldn’t stop adding commentary during the former. Delightful 😂 </p><p class="paragraph" style="text-align:left;">And for part 2, my sister and I managed to sneak in a metric ton of snacks into the theater, including a Ziploc bag of raw cookie dough to snack on. Sneaking snacks into a theater is one of my great joys in life, don’t judge me.</p><p class="paragraph" style="text-align:left;">Currently I’m up late writing this newsletter from Hawaii, continuing my long tradition of writing <i>tl;dr sec</i> from a hotel room in a nice location on not-quite-vacation 😅 </p><p class="paragraph" style="text-align:left;">Have a great rest of your week, and talk soon!</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> How to find and remove viral AI notetakers</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered <i>800 new accounts created in only 90 days</i> 😱 Viral AI notetakers can introduce a slew of data privacy risks by gaining access to calendars and adding themselves to every meeting. </p><p class="paragraph" style="text-align:left;">Learn how to find and remove viral AI notetakers. </p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.nudgesecurity.com/remove-ai-notetakers?utm_medium=sponsored&utm_source=tldr&utm_content=newsletter&utm_campaign=ai_security&utm_term=primary_remove-otter-ai-lp_260108" target="_blank" rel="noopener noreferrer nofollow"><b>Regain control today</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">If I were a betting man, I’d bet that most orgs don’t know how many and which AI notetakers are being used. Or where the data is going 😅 This feels like latent potential attack surface to me. Good to get it under control.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/Adversis/tailsnitch?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Adversis/tailsnitch</a><br>By <a class="link" href="https://www.linkedin.com/company/adversis-llc?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Adversis</a>: A security auditor for Tailscale configurations. Scans your tailnet for 50+ misconfigurations, overly permissive access controls, and security best practice violations. It also can generate SOC 2 compliance reports with Common Criteria mappings.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/joe-desimone/mongobleed?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">joe-desimone/mongobleed</a><br>By <a class="link" href="https://x.com/dez_?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Joe Desimone</a>: A proof-of-concept exploit for the MongoDB zlib decompression vulnerability (CVE-2025-14847) that allows unauthenticated attackers to leak sensitive server memory. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/dez_/status/2004933531450179931?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Joe tweet</a>: “This could be a case study in speed running from patch to poc with LLM. Done in less than 10 minutes with Cursor and a single prompt. Helped that vuln trigger is included as unit test in the fix commit.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.elttam.com/blog/leaking-more-than-you-joined-for/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">ORM Leaking More Than You Joined For</a><br>Elttam’s <a class="link" href="https://www.linkedin.com/in/alex-brown-581075172/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Alex Brown</a> expands on their previous Object Relational Mapper (ORM) Leak research and Black Hat EU briefing <a class="link" href="https://blackhat.com/eu-25/briefings/schedule/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy#ormageddon-leaking-more-than-you-joined-for-49161" target="_blank" rel="noopener noreferrer nofollow">ORMageddon: Leaking More Than You Joined For</a>. ORM Leaks occur when web apps offer robust filtering or search capabilities in a way that can be abused to filter objects by sensitive or hidden fields. Developers often rely on the ORM to determine which fields are queryable and to prevent SQL injection, but overlook explicitly validating which fields <b>should</b> be queryable.</p><p class="paragraph" style="text-align:left;">The post walks through an interesting expression‑parser bug in the Beego ORM, and an authentication‑bypass technique for the Prisma ORM. They’ve published <code>semgrep</code><a class="link" href="https://github.com/elttam/semgrep-rules?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow"> rules</a> for detecting potentially dangerous uses of the Django, Prisma, Beego, and Entity Framework ORMs. They also previously released <a class="link" href="https://github.com/elttam/plormber?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">plormber</a>, a tool for exploiting time-based ORM Leak vulnerabilities.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> GigaOm: &quot;Architecture is the Top Decision Factor in SecOps Automation&quot;</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">The 2025 GigaOm SecOps Automation Radar evaluated 19 vendors and concluded that architecture is the most important decision factor in the market. LLM-first solutions unlock new automation capabilities but face edge cases and volatility in production deployments. Workflow-based tools offer predictability but require extensive manual maintenance. </p><p class="paragraph" style="text-align:left;">The report highlights more specialized and sustainable approaches that combine multiple AI techniques (semantic, behavioral, and LLMs) rather than relying on LLMs alone.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.exaforce.com/resources/gigaom-radar-for-secops-automation?utm_campaign=25648560-GigaOm%202025&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>Get your free copy</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">This looks cool. I agree that architecture for LLM tooling makes a big difference, and I’m a big fan of combining multiple techniques. Seems like an informative read 👍️ </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://securitylabs.datadoghq.com/articles/introducing-pathfinding.cloud/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Introducing </a><a class="link" href="https://securitylabs.datadoghq.com/articles/introducing-pathfinding.cloud/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Pathfinding.cloud</a><br>Datadog’s <a class="link" href="https://linkedin.com/in/sethart?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Seth Art</a> announces the release of <a class="link" href="https://pathfinding.cloud?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">pathfinding.cloud</a>, an extensive knowledge base that documents the IAM permissions and permission sets that allow for privilege escalation in AWS, currently documenting 65+ AWS IAM privilege escalation paths in a standardized YAML schema. Each path includes unique identifiers, categorization (self-escalation, principal access, new/existing PassRole, credential access), required vs. additional permissions, explicit prerequisites for exploitation, attack visualizations, and detection tool coverage. 42% of the paths are currently undetected by existing open-source tools like Prowler, Cloudsplaining, PMapper, and Pacu.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/wiz-zeroday-cloud-hacking-competition-behind-the-scenes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Zero‑Days in the Age of AI: Behind the Scenes of </a><a class="link" href="https://ZeroDay.cloud?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">ZeroDay.cloud</a><a class="link" href="https://www.wiz.io/blog/wiz-zeroday-cloud-hacking-competition-behind-the-scenes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow"> 2025, with a Record High of CVEs in Critical Cloud Infra</a><br>Wiz’s <a class="link" href="https://www.linkedin.com/in/nir-ohfeld-b534b010a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Nir Ohfeld</a> shares the results of the first <a class="link" href="https://zeroday.cloud?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">zeroday.cloud</a> competition, which paid bounties for zero days found in open source technologies powering modern cloud and AI infrastructure. Results: $320,000 in rewards, critical vulnerabilities in Redis, PostgreSQL, Grafana, MariaDB, a container escape on Linux, and more.</p><p class="paragraph" style="text-align:left;">💡 Interestingly, <a class="link" href="https://theori.io/blog/announcing-xint-code?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Team Xint Code</a>, the folks behind the Theori team who competed in the AIxCC cyber grand challenge competition, had successful entries for PostgreSQL, Redis, and MariaDB. In other words, an AI-based vulnerability hunting tool found impactful vulnerabilities in popular, widely used software. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.plerion.com/blog/privilege-escalation-with-sagemaker-and-execution-roles?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Privilege escalation with SageMaker and there&#39;s more hiding in execution roles</a><br>Plerion’s Gen Z whisperer <a class="link" href="https://www.linkedin.com/in/danielgrzelak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Daniel Grzelak</a> describes a privilege escalation pattern in AWS where attackers can gain an instance&#39;s execution role privileges by modifying boot-time code execution configurations. He demonstrates this with two examples: with EC2 (using ec2:ModifyInstanceAttribute to inject userData with a #cloud-boothook directive) and a SageMaker Notebook instance variant (using lifecycle configurations), both allowing attackers to execute arbitrary code with the target&#39;s IAM permissions.</p><p class="paragraph" style="text-align:left;">This pattern generalizes to other AWS services where execution roles are configured separately from code modifications. Daniel recommends detecting these and similar attacks via unusual stop→modify→start sequences, and prevention through strict permission boundaries around configuration-changing capabilities.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.softwaresecured.com/post/aws-privilege-escalation-iam-risks-service-based-attacks-and-new-ai-driven-bedrock-agentcore-vectors?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">AWS Privilege Escalation: IAM Risks, Service-Based Attacks, and New AI-Driven Bedrock/AgentCore Vectors</a><br>Software Secured’s <a class="link" href="https://www.linkedin.com/in/bengoodspeed?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Ben Goodspeed</a> describes how AWS privilege escalation has evolved from classic IAM-based escalations (e.g. <code>iam:AttachUserPolicy</code>) to service-centric attacks (e.g. <code>lambda:UpdateFunctionCode</code>) to AI-driven orchestration vectors in Bedrock and Bedrock AgentCore (e.g. Bedrock CreateCodeInterpreter → arbitrary code execution under privileged roles). </p><p class="paragraph" style="text-align:left;">The posts discuses some scenarios across CloudGoat, IAM-Vulnerable, and CloudFoxable platforms plus new Bedrock challenges, with the key takeaway that many high-risk actions cannot be granularly constrained by SCPs or resource policies because they lack resource-level ARNs or condition keys.</p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/0x4D31/santamon?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">0x4D31/santamon</a><br>By <a class="link" href="https://www.linkedin.com/in/adelka/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Adel Karimi</a>: A lightweight macOS detection sidecar for <a class="link" href="https://github.com/northpolesec/santa?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Santa</a> that evaluates Endpoint Security telemetry locally with CEL rules and forwards only matched detection signals to a backend server. A “poor man’s macOS EDR for home labs and small fleets.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.detectionengineering.net/p/what-are-composite-detections?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">What are Composite Detections?</a><br><a class="link" href="https://linkedin.com/in/zack-allen-12749a76?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Zack Allen</a> explains composite (correlated/stateful) detection rules, which combine multiple atomic detections to reduce false positives by adding context around attack chains, using MITRE ATT&CK as a framework. Zack walks through an example where three atomic rules (admin login, CreateUser, AttachUserPolicy with admin privileges) are combined using windowing (capturing activity in time windows) to detect AWS account persistence attempts, filtering out benign activity that would trigger individual rules.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://redcanary.com/blog/threat-intelligence/email-bombing-virtual-machine?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Beyond the bomb: When adversaries bring their own virtual machine for persistence</a><br>Red Canary’s <a class="link" href="https://www.linkedin.com/in/tonymlambert?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Tony Lambert</a> and <a class="link" href="https://www.linkedin.com/in/chris-brook-91223712/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Chris Brook</a> describe a novel attack where adversaries used spam bombing (flooding a victim’s inbox is with thousands of unsolicited emails, a popular distraction tactic) and social engineering → Quick Assist to deploy a custom QEMU VM running Windows 7 SP1. The VM contained Sliver C2 implants, ScreenConnect, and a QDoor backdoor for network reconnaissance and persistence. Forensic details: Plaso timeline analysis, prefetch data (records info about application usage), browser history, and tools like The Sleuth Kit and VMray.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/appsecco/vulnerable-mcp-servers-lab?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">appsecco/vulnerable-mcp-servers-lab</a><br>By Appsecco’s <a class="link" href="https://www.linkedin.com/in/riyazw?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Riyaz Walikar</a>: A collection of 9 intentionally vulnerable MCP servers designed to help you learn how to penetration test AI agent infrastructure. The labs include servers containing path traversal with code execution via unsafe path joining and unsandboxed Python execution, indirect prompt injection through documents with embedded hidden instructions (both local stdio and remote HTTP+SSE variants), eval-based RCE in a &quot;quote of the day&quot; tool, instruction injection via fabricated tool outputs, supply-chain attacks through typosquatting, secrets/PII exposure in utility tools, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arcanum-sec.github.io/arc_pi_taxonomy/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">The Arcanum Prompt Injection Taxonomy</a><br><a class="link" href="https://linkedin.com/in/jhaddix?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Jason Haddix</a> announced (<a class="link" href="https://executiveoffense.beehiiv.com/p/executive-offense-release-the-arcanum-prompt-injection-taxonomy-v1-5?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">blog</a>) the release of the Arcanum Prompt Injection Taxonomy 1.5, an interactive, open-source classification system for LLM prompt injection attacks. The taxonomy organizes attacks across four dimensions: Attack Intents (goals like data exfiltration or jailbreaking), Attack Techniques (methods like direct or indirect injection), Attack Evasions (obfuscation methods including Base64 encoding and emoji encoding), and Attack Inputs (entry points for attacks). Neat!</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://danielmiessler.com/blog/my-ai-predictions-retrospective?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Everything I&#39;ve Said About AI Since 2016: A Retrospective</a><br><a class="link" href="https://linkedin.com/in/danielmiessler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Daniel Miessler</a> reviews a decade of his AI predictions across topics like how humans and agents interact, impact on the economy, the security implications of using AI, applying AI to security, and more.</p><p class="paragraph" style="text-align:left;">💡 I really like the idea of writing down a bunch of your predictions, and then grading them later. One personal frustration I have is that I <i>haven’t</i> done this really. I remember in ~2010 being very surprised that attackers weren’t systematically backdooring open source libraries/supply chain security wasn’t a big thing. Obviously we’ve seen a lot of malicious dependencies over the past few years. I (and you, dear reader), should try to carve out time to write down our predictions.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/abs/2512.09882?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing</a><br>Stanford’s Justin Lin, <a class="link" href="https://www.linkedin.com/in/dan-boneh-8b599020?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Dan Boneh</a>, and other Stanford, CMU, and Gray Swan AI folks evaluated ten cybersecurity professionals alongside six existing AI agents and ARTEMIS, their new agent scaffold, on a large university network consisting of ~8,000 hosts across 12 subnets. ARTEMIS is a multi-agent framework featuring dynamic prompt generation, arbitrary sub-agents, and automatic vulnerability triaging. ARTEMIS placed second overall, discovering 9 valid vulnerabilities with an 82% valid submission rate and outperforming 9 of 10 human participants.</p><p class="paragraph" style="text-align:left;">They found that AI agents offer advantages in systematic enumeration, parallel exploitation, and cost (certain ARTEMIS variants cost $18/hour vs $60/hour for professional penetration testers). Capability gaps: AI agents exhibit higher false-positive rates and struggle with GUI-based tasks.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">End of Year</p><ul><li><p class="paragraph" style="text-align:left;">Alex Hormozi - <a class="link" href="https://www.youtube.com/watch?v=YONIUpk-kAs&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">26 Lessons from 2025</a></p></li><li><p class="paragraph" style="text-align:left;">Leila Hormozi - <a class="link" href="https://www.youtube.com/watch?v=CqtFlzNivuI&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Give Me 8 Minutes and I’ll Make 2026 The Best Year Yet</a></p></li><li><p class="paragraph" style="text-align:left;">Chris Williamson (Modern Wisdom) - <a class="link" href="https://www.youtube.com/watch?v=2NjN6W8cnIg&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">23 Lessons from 2025</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://chriswillx.com/review/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Modern Wisdom Annual Review Template</a></p></li><li><p class="paragraph" style="text-align:left;">Dickie Bush - <a class="link" href="https://www.youtube.com/watch?v=uxBFc5K8xwY&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">8 Key Lessons Learned From 8 Years Of Journaling</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">Andrej Karpathy - <a class="link" href="https://karpathy.bearblog.dev/year-in-review-2025/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">2025 LLM Year in Review</a></p></li><li><p class="paragraph" style="text-align:left;">Latent Space - <a class="link" href="https://www.youtube.com/watch?v=zuJyJP517Uw&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Steve Yegge&#39;s Vibe Coding Manifesto: Why Claude Code Isn&#39;t It & What Comes After the IDE</a></p></li><li><p class="paragraph" style="text-align:left;">AI Explained - <a class="link" href="https://www.youtube.com/watch?v=FMMpUO1uAYk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">2025 AI Year in Review + 2026 Forecast</a></p></li><li><p class="paragraph" style="text-align:left;">AI Engineer - <a class="link" href="https://www.youtube.com/watch?v=RFKCzGlAU6Q&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">How Claude Code Works - Jared Zoneraich, PromptLayer</a></p></li><li><p class="paragraph" style="text-align:left;">AI Engineer - <a class="link" href="https://www.youtube.com/watch?v=eIoohUmYpGI&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">The Infinite Software Crisis – Jake Nations, Netflix</a></p></li><li><p class="paragraph" style="text-align:left;">AI Engineer - <a class="link" href="https://www.youtube.com/watch?v=pP_dSNz_EdQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Continual System Prompt Learning for Code Agents – Aparna Dhinakaran, Arize</a></p></li><li><p class="paragraph" style="text-align:left;">AI Engineer - <a class="link" href="https://www.youtube.com/watch?v=SZStlIhyTCY&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Moving away from Agile: What&#39;s Next – Martin Harrysson & Natasha Maniar, McKinsey & Company</a></p></li><li><p class="paragraph" style="text-align:left;">Jeffrey Emmanuel - <a class="link" href="https://x.com/doodlestein/status/1999934160442687526?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Prompts to make progress on all your projects every day</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reddit.com/r/ClaudeAI/comments/1q2c0ne/comment/nxc4ap6/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Claude Code creator Boris shares his setup</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/ryancarson/status/2008548371712135632?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Step-by-step guide to get Ralph working and shipping code</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Music</p><ul><li><p class="paragraph" style="text-align:left;">Sungha Jung - <a class="link" href="https://www.youtube.com/watch?v=y23BxN55pwc&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Golden (HUNTR/X) - Sungha Jung - Fingerstyle Cover</a></p></li><li><p class="paragraph" style="text-align:left;">Epic Orchestra cover - KPop Demon Hunters - <a class="link" href="https://www.youtube.com/watch?v=YNyILzQ5_lQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Golden</a>, <a class="link" href="https://www.youtube.com/watch?v=R4OgUa9NNj4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Free</a></p></li><li><p class="paragraph" style="text-align:left;">SNL - <a class="link" href="https://www.youtube.com/watch?v=IYmSuZHDTdg&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">I Miss My Ex’s Dad</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=H6q4eaBXGiU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">OneRepublic - &#39;Counting Stars&#39; & &#39;I Don&#39;t Wanna Wait&#39; | Behind the Song</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://hackernews-readings-613604506318.us-west1.run.app/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Books referenced on Hacker News</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=QcM_toXn4Xs&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">HASBULLA & THE RIZZLER: Sundae Conversation with Caleb Pressley</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.jmail.world/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Jmail</a> - Someone built a Gmail-like interface for browsing released Epstein emails. So you can use the search box, filter by person, etc. Very cool, intuitive way to enable for people to interact with public record info in a familiar interface.</p></li><li><p class="paragraph" style="text-align:left;">Johnny Harris - <a class="link" href="https://www.youtube.com/watch?v=PpyPB3BF-hQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">What Being a BILLIONAIRE Really Looks Like</a> - Fascinating.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/post/UgkxVQg6hZp2TuC5WTqmwzv3AbqZBgUpdI2H?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Bryan Johnson on his psilocybin (magic mushrooms) trip</a></p></li><li><p class="paragraph" style="text-align:left;">Sketch comedy - <a class="link" href="https://x.com/justin_hart/status/1919372017079669122?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Oxford comma and other punctuation</a></p></li><li><p class="paragraph" style="text-align:left;">SNL - <a class="link" href="https://www.youtube.com/watch?v=6XtaXtFWURk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Espresso Martini</a></p></li><li><p class="paragraph" style="text-align:left;">Aakash Gupta on <a class="link" href="https://x.com/aakashg0/status/1997114841216217441?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">why Meta paid to kill a $99 AI pendant (Limitless)</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2026/01/05/hacktivist-deletes-white-supremacist-websites-live-on-stage-during-hacker-conference?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Hacktivist Martha Root deleted the servers</a> of WhiteDate, WhiteChild, and WhiteDeal in real time at the end of a talk at CCC</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://ca.news.yahoo.com/man-boards-heathrow-flight-without-081243825.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">Man boards Heathrow flight without ticket, boarding pass or passport</a> - How to get hired for physical pen tests.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-310-vulnerable-mcp-labs-pathfinding-cloud-prompt-injection-taxonomy" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=0684be05-f9c7-4333-9a82-730861759670&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #309 - Winning the AI Cyber Race, SAST at LinkedIn, Detection Engineering</title>
  <description>Why AI offense is beating defense and Verifiability is All You Need, how LinkedIn scales SAST to millions of LOC and 10k&#39;s of repos, atomic detection rules</description>
  <link>https://tldrsec.com/p/tldr-sec-309</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-309</guid>
  <pubDate>Thu, 18 Dec 2025 15:30:46 +0000</pubDate>
  <atom:published>2025-12-18T15:30:46Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🏡 Family Time</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">This week I’ve been visiting my family in the Midwest, and despite the daily high temperature here being the low in San Francisco, so far I’ve managed to survive.</p><p class="paragraph" style="text-align:left;">I recently realized I’ve developed a reputation in my family for bringing sketchy looking things on airplanes. </p><p class="paragraph" style="text-align:left;">This time I brought two Ziploc bags of different protein powders so I could do a taste test with my brother. Fortunately, the TSA was not bothered by two unlabeled plastic bags of powder in my carry-on 😂</p><p class="paragraph" style="text-align:left;">One thing in particular I’m planning to do while at home is interviewing my family on stories from their lives.</p><p class="paragraph" style="text-align:left;">I’ve realized it’s so easy to lose details about my parents’ lives before I were born, or childhood stories my siblings have that are way different than what I remember.</p><p class="paragraph" style="text-align:left;">I think I’ll collect the photos and stories (text, videos) in some combination of a Google Doc and Google Drive / iCloud folder that I’ll share with the whole family.</p><p class="paragraph" style="text-align:left;">If you haven’t done this before, you should give it a try. Sharing stories is a nice way to bring people together and learn about how they view the world.</p><p class="paragraph" style="text-align:left;">📚️ Also: <i>tl;dr sec</i> will be <b>off for the next two weeks</b>, resuming January 8th, 2026.</p><p class="paragraph" style="text-align:left;">I hope you get some time to relax and spend time with loved ones over the holidays! 🎄 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">P.S. Apparently the hosting provider Daniel Miessler used for his slides for our webinar (on building your personal AI infrastructure) had low bandwidth and it caused a number of people to get an error when they tried to download the slides. Sorry! You can access his <a class="link" href="https://drive.google.com/file/d/10XSzX18242IRg4kpbebxISVvUsh6Y3LT/view?usp=drive_link&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">slides here</a>, and again the <a class="link" href="https://semgrep.dev/events/video-library/?title=building-your-personal-ai-infrastructure-with-daniel-miessler&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">video here</a>.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>What if your vulnerability scanner only gave you true positives?</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">We gave James Berthoty, a leading analyst and ex-security engineer, access to Maze to test in his own AWS environment with no script and said, “hit record, we’ll share what you see.”</p><p class="paragraph" style="text-align:left;">The result? Most CVEs look scary on paper, but even if the scanner picked it up, they couldn’t actually be exploited in the specific environment. Maze uses AI agents to investigate each vulnerability in context: runtime signals, network exposure, and real attack paths, just like your best security engineer would. If Maze says it’s exploitable, it’s a real problem backed by evidence.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://mazehq.com/blog/analysts-take-on-maze?utm_campaign=dec2025-meetmaze&utm_medium=newsletter&utm_source=tldrsec" target="_blank" rel="noopener noreferrer nofollow"><b>See the Investigation</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">This was cool, I like this format a lot: James pulled up his own AWS environment and reviewed a few findings in Maze’s UI, with no guidance from them. I like how the AI agents provide a bunch of context, and concrete reproduction details about what they did and what it means. Done well, this definitely saves a lot of time.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://portswigger.net/research/the-fragile-lock?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">The Fragile Lock: Novel Bypasses For SAML Authentication</a><br>Portswigger’s <a class="link" href="https://x.com/zakfedotkin?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Zakhar Fedotkin</a> shows “how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusion, and a new class of Void Canonicalization attacks. These techniques allow an attacker to completely bypass XML Signature validation while still presenting a perfectly valid SAML document to the application.” You can download the Burp Suite extension that automates the entire exploitation process from <a class="link" href="https://github.com/d0ge/XSW?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://fil-c.org/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Fil-C</a><br>Fil-C is a memory-safe implementation of C and C++ that catches all memory safety errors as panics, using concurrent garbage collection and &quot;InvisiCaps&quot; (invisible capabilities) to check every potentially unsafe operation. The implementation maintains &quot;fanatical compatibility&quot; with existing C/C++ codebases, supporting advanced features like threads, atomics, exceptions, signal handling, longjmp/setjmp, and shared memory, with many open source programs including CPython, OpenSSH, GNU Emacs, and Wayland working without modification. It&#39;s possible to run a <a class="link" href="https://fil-c.org/pizlix.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">totally memory safe Linux userland</a>.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The post <a class="link" href="https://fil-c.org/seccomp?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Linux Sandboxes And Fil-C</a> describes how to combine Fil-C&#39;s memory safety with Linux sandboxing techniques, specifically focusing on adapting OpenSSH&#39;s seccomp-BPF sandbox to work with Fil-C. See also the <a class="link" href="https://chromium.googlesource.com/chromium/src/+/0e94f26e8/docs/linux_sandboxing.md?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Chromium</a> and <a class="link" href="https://wiki.mozilla.org/Security/Sandbox/Seccomp?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Mozilla </a>docs on how to do sandboxing on Linux using seccomp.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/blog/engineering/security/modernizing-linkedins-static-application-security-testing-capabilities?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Modernizing LinkedIn’s Static Application Security Testing Capabilities</a><br>Great post by <a class="link" href="https://www.linkedin.com/in/emmanuel-1337?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Emmanuel Law</a>, <a class="link" href="https://www.linkedin.com/in/bullhacks3?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Bakul Gupta</a>, <a class="link" href="https://www.linkedin.com/in/francisalexander?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Francis Alexander</a>, and <a class="link" href="https://www.linkedin.com/in/keshav-malik?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Keshav Malik</a> share how LinkedIn has scaled their SAST efforts across millions of lines of code and tens of thousands of repositories. They use CodeQL and Semgrep via GitHub Actions, require SARIF to be uploaded with no vulnerabilities above a security threshold before PRs can be merged, manage scanning config via a minimal “stub workflow” that calls a centralized SAST workflow (so the main SAST workflow can be more easily iterated on, vs pushing an updated workflow to every repo). </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">They also built a Drift Management System that runs daily and ensures every repo has the stub workflow and that it matches the latest version, automatically updating it if not. The post also discusses how they handle observability, customizing which rules run where, custom rules and remediation advice, and more.</p></div><p class="paragraph" style="text-align:left;">💡 Great example of security engineering and thoughtfully designing a SAST program that works at scale. Solid read 👍️ </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> Supercharge Your SOC with AI, starting now</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Grab Filip Stojkovski’s new eBook, <i>An Implementation Guide for AI-Driven Security Operations.</i> SOCs are ditching clunky, manual playbooks for agentic AI, and this field guide shows you exactly how to modernize without chaos.</p><p class="paragraph" style="text-align:left;">Take a look to learn to:</p><ul><li><p class="paragraph" style="text-align:left;">Gauge SOC maturity and set an AI roadmap</p></li><li><p class="paragraph" style="text-align:left;">Build the data foundation AI needs</p></li><li><p class="paragraph" style="text-align:left;">Select platforms that actually deliver</p></li><li><p class="paragraph" style="text-align:left;"> Prove wins with KPIs and ROI</p></li></ul><p class="paragraph" style="text-align:left;">From greenfield to MDR to mature SOCs, use step-by-step playbooks to go from alert fatigue to AI speed.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.exaforce.com/downloads/implementation-guide-for-ai-driven-security-operations?utm_source=tldrsec&utm_campaign=FY25Q4_Filip_eBook&utm_content=Filip_eBook" target="_blank" rel="noopener noreferrer nofollow"><b>Get the Exaforce eBook by Filip Stojkovski</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">I’ve been enjoying Filip’s writing, he really has his finger on the pulse of the AI + SOC/detection space. And Exaforce has been sharing some 👌 technical blog posts recently.</p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@atulkishorjaiswal/abusing-aws-systems-manager-as-a-covert-c2-channel-017bb13b6010?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Abusing AWS Systems Manager as a Covert C2 Channel</a><br><a class="link" href="https://www.linkedin.com/in/atulkishorjaiswal?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Atul Kishor Jaiswal</a> describes how to abuse AWS Systems Manager&#39;s hybrid activation feature to establish a covert command and control (C2) channel on macOS and Windows systems using legitimate, Amazon-signed binaries. Basically you install the official SSM agent on the victim machine, which then communicates with AWS endpoints over HTTPS, providing attackers with file system access, process monitoring, shell command execution, and terminal sessions without triggering security alerts as the agents communicate exclusively with trusted AWS endpoints and require no open ports or custom malware. The post concludes with Mac and Windows-specific detection strategies.</p><p class="paragraph" style="text-align:left;">💡 I expect to see more “Living off the Cloud” techniques like this.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.offensai.com/blog/aws-iam-eventual-consistency-persistence?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Exploiting AWS IAM Eventual Consistency for Persistence</a><br>OFFENSAI&#39;s <a class="link" href="https://linkedin.com/in/eduard-k-agavriloae?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Eduard Agavriloae</a> describes how AWS IAM&#39;s eventual consistency creates a ~4-second window where deleted access keys and other IAM changes remain valid, allowing attackers to maintain persistence even after credentials are supposedly revoked. An attacker can detect when their keys are deleted and quickly create new credentials or assume roles before the deletion fully propagates, maintaining persistence. Traditional remediation approaches like applying deny policies fail during this window, as attackers can detect and remove these restrictions before they take effect. </p><p class="paragraph" style="text-align:left;">The most effective mitigation is applying Service Control Policies (SCPs) at the account level, which attackers can&#39;t modify, followed by waiting for the consistency window to close before proceeding with traditional remediation steps.</p><p class="paragraph" style="text-align:left;">💡 Dude, this is pretty crazy 🤯 I’m sure this is going to happen in the wild now, if it wasn’t already.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.cloudflare.com/shift-left-enterprise-scale?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Shifting left at enterprise scale: how we manage Cloudflare with Infrastructure as Code</a><br><a class="link" href="https://www.linkedin.com/in/chasegrobinson?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Chase Catelli</a>, <a class="link" href="https://www.linkedin.com/in/ryan-pesek-47031348?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Ryan Pesek</a>, and <a class="link" href="https://www.linkedin.com/in/derek-pitts?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Derek Pitts</a> describe how the Cloudflare security team implemented a &quot;shift left&quot; approach to manage hundreds of internal production Cloudflare accounts using Infrastructure as Code (IaC) with Terraform, Atlantis, and a custom tool called tfstate-butler, that acts as a broker to securely store state files. </p><p class="paragraph" style="text-align:left;">They enforce security baselines through Policy as Code using Open Policy Agent (OPA) and Rego, which automatically validates configurations during merge requests to catch issues before deployment. There are currently ~50 custom policies, for example: only @<a class="link" href="https://cloudflare.com?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">cloudflare.com</a> emails are allowed to be used in an access policy. The team also developed a drift detection service to identify unauthorized dashboard changes and implemented cf-terraforming to simplify the onboarding of existing resources.</p><p class="paragraph" style="text-align:left;"></p></div><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/mandiant/gostringungarbler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">mandiant/gostringungarbler</a><br>By <a class="link" href="https://www.linkedin.com/company/mandiant?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Mandiant</a>: A Python command-line project to resolve all strings in Go binaries obfuscated by <a class="link" href="https://github.com/burrowers/garble?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">garble</a>. The tool works by identifying decryption routines through regex patterns, emulating them with the unicorn emulator, and patching the binary with deobfuscated strings.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.detectionengineering.net/p/field-manual-4-what-are-atomic-detection?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Field Manual #4: What are Atomic Detection Rules?</a><br>Friend of the newsletter <a class="link" href="https://linkedin.com/in/zack-allen-12749a76?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Zack Allen</a> continues his detection engineering series, this time discussing “atomic detection rules,” which are narrowly defined rules that detect activity at a point in time with little to no context. Zack uses David Bianco&#39;s Pyramid of Pain framework to illustrate how detection effectiveness increases as you move from simple indicators (IPs, domains) to more complex TTPs. </p><p class="paragraph" style="text-align:left;">The post describes how atomic detections lacking environmental context generate false positives, using examples of AWS admin logins and C2 IP address alerting to show how single-value matching creates brittle rules that attackers can easily evade. As detection engineers add more context to rules, defender operational costs increase but false positive rates decrease, an ever present cost-benefit tradeoff when writing detection rules.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://teamghost.substack.com/p/redefining-detection-engineering?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Redefining Detection Engineering: Part I</a><br>Tallis Jordan defines detection engineering as “the application of software engineering concepts to transform raw data into high-fidelity, actionable alerts that are measurable, manageable, and reliable through repeatable techniques, such as version control, testing, and optimization.” Not: just writing SIEM rules. Tallis outlines core principles including: the Generalizability Principle (behaviors over signatures), Assume Breach Mindset, Data-Driven Decision Making, Fail Fast/Learn Faster, and Signal vs. Noise Obsession. The post includes industry statistics from CardinalOps showing most organizations only cover 21% of MITRE ATT&CK techniques, 13% of rules broken, 60% of attacks undetected, and 80% of detections untested or misconfigured.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">In <a class="link" href="https://teamghost.substack.com/p/redefining-detection-engineering-d29?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Part 2</a>, Tallis describes the day-to-day: the responsibilities, deliverables, and expectations of a detection engineer. Core responsibilities include: detection research and development, validation through test cases and adversary emulation, lifecycle management with git, implementation of CI/CD pipelines for Detection-as-Code, risk assessment based on business context, log source management, and cross-team collaboration.</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.lum8rjack.com/posts/caddy-c2?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">C2 Redirectors Made Easy</a><br><a class="link" href="https://www.linkedin.com/in/muellerclint/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Clint Mueller</a> (great name 👏) announces <a class="link" href="https://github.com/lum8rjack/caddy-c2?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">caddy-c2</a>, a Caddy module that automatically parses C2 profiles and proxies legitimate C2 traffic without manually configuring redirect rules for User-Agents and HTTP endpoints. Putting redirectors in front of a C2 server obscures the actual location of the C2 server, allows only legitimate C2 traffic to reach the C2 server, and if the traffic is detected and blocked, the proxy can easily be destroyed and a new one deployed in it’s place, which is easier than re-deploying the C2 server.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://x90x90.dev/posts/stillepost?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Stillepost - Or: How to Proxy your C2s HTTP-Traffic through Chromium</a><br><a class="link" href="https://x.com/dis0rder_0x00?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">dis0rder</a> introduces <a class="link" href="https://github.com/dis0rder0x00/stillepost?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">stillepost</a>, a tool that leverages Chrome DevTools Protocol (CDP) to proxy C2 traffic through legitimate browser processes, helping attackers blend in with normal web traffic. By spawning a headless Chromium browser with remote debugging enabled, connecting via WebSockets, and using the Runtime.evaluate method to execute JavaScript that makes XHR requests, the tool allows malware to send HTTP requests through the browser rather than directly from the implant. This technique benefits from the browser&#39;s existing proxy configuration, firewall rules, and expected network behavior, though it&#39;s limited to servers that allow CORS requests from arbitrary origins.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.kyntra.io/Singularity-A-final-boss-linux-kernel-rootkit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit</a><br><a class="link" href="https://twitter.com/MatheuzSecurity?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">MatheuZ</a> describes <a class="link" href="https://github.com/MatheuZSecurity/Singularity?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Singularity</a>, a Loadable Kernel Module (LKM) rootkit developed for modern Linux kernels (6.x) with advanced evasion and persistence techniques. Singularity uses ftrace for syscall hooking instead of directly modifying the System Call Table, implements multi-layered process hiding through PID tracking and directory listing filtering (/proc), conceals files and network connections, provides privilege escalation vectors via signals and environment variables, sanitizes kernel logs to remove evidence of its presence, and includes anti-forensic techniques to prevent detection by both 64-bit and 32-bit tools.</p><p class="paragraph" style="text-align:left;">💡 Great overview of a ton of different places and ways to detect and hide on Linux.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://sergejepp.substack.com/p/winning-the-ai-cyber-race-verifiability?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Winning the AI Cyber Race: Verifiability is All You Need</a><br>Sysdig CISO <a class="link" href="https://www.linkedin.com/in/sergejepp?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Sergej Epp</a> argues that AI is transforming offensive security faster than defense because offensive tasks have built-in binary verifiers (shell popped? exploit worked? root access?) while defensive tasks like SIEM analysis, GRC, and forensics lack mechanical ground truth, leading to noise and low precision. “Agents + Oracles = The Unlock.” “<b>Who owns the verifiers wins the AI race.”</b></p><p class="paragraph" style="text-align:left;">Sergej contrasts Google&#39;s Sec-Gemini (~12% precision on forensic timeline analysis) with Microsoft&#39;s Project Ire (98% precision on Windows driver classification) to show that wrapping LLMs with proper tool scaffolding (sandboxes, decompilers like Ghidra and angr, and validator agents) is what drives results, not raw model capability. </p><p class="paragraph" style="text-align:left;">The path forward for defense is engineering six classes of mechanical verifiers: canary verifiers (honeytokens), provenance proofs (SLSA, SBOMs), replay harnesses for detection rules, policy-as-code (Rego, OPA, Checkov), sandboxing and dynamic analysis, and graph-based verifiers (attack graphs, reachability analysis, cloud security posture). Security leaders should demand vendors explain their mechanical verification methods, adopt continuous AI red teaming to expose verifier gaps, and build realistic cyber gyms since LLMs can&#39;t generalize on private enterprise data they&#39;ve never seen. See also Sergej’s <a class="link" href="https://www.youtube.com/watch?v=BaSuergb1cY&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">BSidesFrankfurt 2025 keynote</a> on this topic.</p><p class="paragraph" style="text-align:left;">💡 This post is 🔥, highly recommend. The importance of verifiability is a key insight, I’ve been thinking about this for awhile. I’m documenting this prediction here so I can point to it in the future.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://martin.kleppmann.com/2025/12/08/ai-formal-verification.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Prediction: AI will make formal verification go mainstream</a><br><a class="link" href="https://www.linkedin.com/in/martinkleppmann?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Martin Kleppmann</a> predicts that AI will make formal verification mainstream by dramatically reducing the cost and expertise required to write proof scripts for tools like Rocq, Isabelle, Lean, F*, and Agda. He argues that LLMs are well-suited for writing proofs because invalid proofs will be rejected by verified proof checkers, and that formal verification will let us ship AI-generated code quicker with confidence, reducing the need for human review (which could become the bottleneck). Martin believes the challenge will shift from writing proofs to correctly defining specifications for your software.</p><p class="paragraph" style="text-align:left;">💡 I think this is a good argument- formal verification proofs are hard to write and require expertise, but LLMs can potentially churn them out quickly/better than humans at scale (like unit tests), and with the proof checkers we have an oracle that can automatically return if the proof is valid. </p><p class="paragraph" style="text-align:left;">The difficulty is going to be actually specifying what the system should do in sufficient detail, and for most companies and products, unlike what academia works on, these are rapidly built, quickly iterated on applications that are being shipped to the user ASAP, so I somewhat doubt if more than like 1% of software could be described by its creators in specification-level detail. That said, this could be huge for OS kernels, parsing libraries (leverage the RFC for that format as the spec), cryptographic libraries, and compilers, which could reduce or eliminate many serious vulnerabilities. Excited to see more in this space!</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.galois.com/articles/escaping-isla-nublar-coming-around-to-llms-for-formal-methods?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Escaping Isla Nublar: Coming around to LLMs for Formal Methods</a><br>Galois intern <a class="link" href="https://www.linkedin.com/in/twainbyrnes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Twain Byrnes</a> describes building <i>CNnotator</i>, a command-line tool that uses LLMs to automatically synthesize annotations describing memory use for each function in a C project. Instead of trying to jump directly from C to Rust, CNnotator figures out the memory shape of the original C program, which should hopefully make translating to safe Rust much easier. The LLM-generated candidate annotation is tested using CN’s property based testing capability, which functions as an oracle for “is this annotation correct?”</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">See also symbolic methods of translating C to (unsafe, unidiomatic) Rust, like <a class="link" href="https://c2rust.com/manual/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">C2Rust</a>, <a class="link" href="https://github.com/jameysharp/corrode?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Corrode</a>, and <a class="link" href="https://gitlab.com/citrus-rs/citrus?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Citrus</a>, and the paper <a class="link" href="https://arxiv.org/html/2501.14257v1?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">C2SaferRust</a>, which combines C2Rust, LLMs, and formal methods.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.galois.com/articles/claude-can-sometimes-prove-it?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Claude Can (Sometimes) Prove It</a><br>Galois’ <a class="link" href="https://www.linkedin.com/in/mike-d-dodds?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Mike Dodds</a> found Claude Code surprisingly good at interactive theorem proving (ITP), a traditionally difficult formal methods approach. Mike used Claude Code to formalize a complex concurrent programming paper in Lean, producing 2,535 lines of code with minimal human intervention, though the agent sometimes required guidance through challenging proofs, struggled with parsing errors, and occasionally made deep conceptual mistakes that were difficult to correct.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cyberark.com/resources/threat-research-blog/vulnhalla-picking-the-true-vulnerabilities-from-the-codeql-haystack?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Vulnhalla: Picking the true vulnerabilities from the CodeQL haystack</a><br>CyberArk’s <a class="link" href="https://www.linkedin.com/in/simcha-k?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Simcha Kosman</a> introduces <a class="link" href="https://github.com/cyberark/Vulnhalla?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Vulnhalla</a> (BlackHat EU 2025 abstract and slides <a class="link" href="https://blackhat.com/eu-25/briefings/schedule/index.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering#flaw-and-order-finding-the-needle-in-the-haystack-of-codeql-using-llms-49247" target="_blank" rel="noopener noreferrer nofollow">here</a>), a tool that uses LLMs to triage static analysis (CodeQL in this case) findings to reduce false positives while vulnerability hunting. Using this process, Simcha found 7 CVEs in projects such as the Linux Kernel and ffmpeg in 2 days for under $80.</p><p class="paragraph" style="text-align:left;">The unique methodology parts here are:</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Pre-extracting code context using CodeQL into CSV files (start/end lines of code for functions, etc.) which can then be read by the LLM triage process to pull in relevant context in order for it to make a true positive/false positive decision.</p></li><li><p class="paragraph" style="text-align:left;">Using “Guided Questions” that force the LLM to reason step-by-step about data flow and control flow like an experienced security researcher.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Where is the source buffer declared? What size does it have? Does this size ever change? Where is the destination buffer declared? Are these buffers assigned from another location? What conditions or operations affect them?</p></li><li><p class="paragraph" style="text-align:left;">→ Then after answering these give your verdict.</p></li></ol></li></ol><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7572af05-72c2-4e7f-8cc8-e3358b0ffeda/image.png?t=1765921482"/></div><p class="paragraph" style="text-align:left;">💡 We’ve already seen blogs from <a class="link" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Sean Heelan</a> and <a class="link" href="https://noperator.dev/posts/slice?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Caleb Gross</a> which also use CodeQL + LLMs for triaging results. One methodology note: Simcha’s post seems to assume that any finding marked by the security agent as a FP <i>is</i> a FP, but in reality the agent will be wrong some percent of the time. It’d be nice to have some human ground truth analysis of the TP/FP rate of the security agent itself.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Fame</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/mqo89?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Influencers are royalty at this college, and the turf war is vicious</a> - College, you know, that place people go to learn 🫠 </p></li><li><p class="paragraph" style="text-align:left;">charli xcx - <a class="link" href="https://substack.com/inbox/post/179505702?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">The realities of being a pop star</a> - Fascinating and candid.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;">Cimorelli - <a class="link" href="https://www.youtube.com/watch?v=KOLoI8OWdMw&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">KPop Demon Hunters - Golden (Harmony Loop Cover)</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://noyb.eu/en/tiktok-unlawfully-tracks-your-shopping-habits-and-your-use-dating-apps?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">TikTok unlawfully tracks your shopping habits – and your use of dating apps</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/hack-reveals-the-a16z-backed-phone-farm-flooding-tiktok-with-ai-influencers/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Hack Reveals the a16z-Backed Phone Farm Flooding TikTok With AI Influencers</a> - “Doublespeed uses a phone farm to manage at least hundreds of AI-generated social media accounts and promote products. The hack reveals what products the AI-generated accounts are promoting, often without the required disclosure that these are advertisements, and allowed the hacker to take control of  more than 1,000 smartphones that power the company.” </p><ul><li><p class="paragraph" style="text-align:left;">See also: <a class="link" href="https://www.404media.co/a16z-backed-startup-sells-thousands-of-synthetic-influencers-to-manipulate-social-media-as-a-service/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">a16z-Backed Startup Sells Thousands of ‘Synthetic Influencers’ to Manipulate Social Media as a Service</a></p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/gBqu1?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Meta’s New A.I. Superstars Are Chafing Against the Rest of the Company</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/5TcvJ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">What OpenAI Did When ChatGPT Users Lost Touch With Reality</a> - “Some of the people most vulnerable to the chatbot’s unceasing validation, they say, were those prone to delusional thinking, which <span style="text-decoration:underline;"><a class="link" href="https://archive.is/o/5TcvJ/https://link.springer.com/article/10.1007/s11920-006-0023-1?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(50, 104, 145)">studies</a></span> <span style="text-decoration:underline;"><a class="link" href="https://archive.is/o/5TcvJ/https://www.cambridge.org/core/journals/psychological-medicine/article/abs/an-updated-and-conservative-systematic-review-and-metaanalysis-of-epidemiological-evidence-on-psychotic-experiences-in-children-and-adults-on-the-pathway-from-proneness-to-persistence-to-dimensional-expression-across-mental-disorders/E215E3B22064B1F688BAE40A16E4D0CB?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(50, 104, 145)">have</a></span> <span style="text-decoration:underline;"><a class="link" href="https://archive.is/o/5TcvJ/https://www.sciencedirect.com/science/article/abs/pii/S0920996419304785?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(50, 104, 145)">suggested</a></span> could include 5 to 15 percent of the population.”</p></li><li><p class="paragraph" style="text-align:left;">Andrej Karpathy tweet on the <a class="link" href="https://x.com/karpathy/status/1993010584175141038?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">implications of AI to schools</a></p></li><li><p class="paragraph" style="text-align:left;">The Economist - <a class="link" href="https://archive.is/Lojkq?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">How HR took over the world</a> - The profession has rocketed in size and stature. Will AI shrink it?</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/qyzsB?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">American remote-work cities show signs of strain</a> - More people working from home → fewer people going downtown, fewer office leases → less tax revenue.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=JV-wY5pxXLo&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">From Vibe Coding To Vibe Engineering – Kitze</a> - Very fun talk, lots of memes.</p></li><li><p class="paragraph" style="text-align:left;">Lee Robinson describes how <a class="link" href="https://leerob.com/agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">he migrated cursor.com from a CMS</a> to raw code and Markdown. He estimated it would take a few weeks, but was able to finish the migration in three days with $260 in tokens and hundreds of agents.</p><ul><li><p class="paragraph" style="text-align:left;">What sticks out to me: a) there’s so much value in having agents be able to quickly read/understand/edit things, that abstractions that make this more difficult are potentially not worth it. b) A lot of SaaS apps / software in general is going to need to fight for their money/customers vs just having customers re-build it in house. Long term in-house maintenance costs might be high though.</p></li><li><p class="paragraph" style="text-align:left;">“The cost of abstractions with AI is very high. Over abstraction was always annoying and a code smell but now there’s an easy solution: spend tokens. It was well worth the money to delete complexity from our codebase and it already paid for itself.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.sanity.io/blog/you-should-never-build-a-cms?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">Thoughtful response from Sanity</a>, the CMS cursor migrated from, on the nuances of CMS systems and what some of the complexity supports.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-309-winning-the-ai-cyber-race-sast-at-linkedin-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=031cca12-8c8f-4c22-9261-229c607077c9&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #308 - MCP Security, AWS re:Invent Recaps, Detecting Malicious Pull Requests with AI</title>
  <description>MCP practice labs and securing MCP paper, re:Invent highlights, how Datadog detects malicious PRs at scale</description>
  <link>https://tldrsec.com/p/tldr-sec-308</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-308</guid>
  <pubDate>Thu, 11 Dec 2025 15:31:33 +0000</pubDate>
  <atom:published>2025-12-11T15:31:33Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🥖🗼La Vie de Clint </h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Some recent anecdotes from my life:</p><ul><li><p class="paragraph" style="text-align:left;">I caught up with my friend <a class="link" href="https://www.linkedin.com/in/dmolnar?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">David Molnar</a>, who leads the program analysis team at Meta. Lots of neat stuff in the works. I remember meeting David when I was a grad student, over a decade ago 👴 Careers are long, and the security industry is small.</p></li><li><p class="paragraph" style="text-align:left;">In a recent musical improv comedy show I sang a poignant ballad about how I was the only survivor of 100 passengers in a tragic clown car accident. Super stoked for BSidesSF’s musical theme next year 😍 </p></li><li><p class="paragraph" style="text-align:left;">Next week I’m going back home to the Midwest to visit family for the holidays. We always get an (arguably dangerously) tall fresh tree. Ready to hit the gym with my bro 💪 </p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">P.S. In case you missed it, here is the <a class="link" href="https://semgrep.dev/events/video-library/?title=building-your-personal-ai-infrastructure-with-daniel-miessler&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">recording</a> and <a class="link" href="https://share.danielmiessler.com/eDuJwyKQ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">slides</a> for the webinar with my bud <a class="link" href="https://www.linkedin.com/in/danielmiessler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Daniel Miessler</a> on his personal AI setup that enables him to much more productive. Super cool slides (shout-out nano banana) and neat live demos!</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> We tried to get an AI agent to write vulnerability checks for us…</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;"><span style="color:rgb(0, 0, 0);">Like everyone else, we’ve been curious about how useful AI agents really are for day-to-day security work. So we threw one in the deep end and asked it to write new vulnerability checks from scratch. It started strong—until it introduced a vulnerability of its own.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(0, 0, 0);">The irony wasn’t lost on us.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(0, 0, 0);">In our latest research, we break down what happened, why it matters, and how to safely mitigate the risks that come with AI-assisted coding.</span></p><h2 class="heading" style="text-align:center;"><span style="color:rgb(0, 0, 0);"><b>👉 </b></span><a class="link" href="https://www.intruder.io/research/vibe-coding-security-risks?utm_source=tldrsec&utm_medium=p_referral&utm_campaign=global|fixed|vibe_coding" target="_blank" rel="noopener noreferrer nofollow"><b>Read the full article </b></a><span style="color:rgb(0, 0, 0);"><b>👈</b></span></h2></div><p class="paragraph" style="text-align:left;">Interesting, vibe coding a honeypot that ends up having an unintended vulnerability in it 🤔 </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@boblord/lets-stop-hacklore-d5c86a0fdad8?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Let&#39;s Stop Hacklore!</a><br><a class="link" href="https://www.linkedin.com/in/lordbob?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Bob Lord</a> announces <a class="link" href="https://hacklore.org?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">hacklore.org</a> to combat outdated cybersecurity advice, backed by 80+ security practitioners who recognize that common &quot;hacklore&quot; myths distract people from the correct security basics. He emphasizes focusing on fundamentals like strong MFA, password managers, and keeping software updated instead of worrying about unlikely threats.</p><p class="paragraph" style="text-align:left;">💡 Some solid, straightforward advice 👍️ Good for sharing with the non technical people in your life after you fix their printer over the holidays.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://lyra.horse/blog/2025/12/svg-clickjacking/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">SVG Filters - Clickjacking 2.0</a><br><a class="link" href="https://x.com/rebane2001?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Lyra</a> describes “SVG clickjacking,” a new technique that takes traditional clickjacking from just tricking users into making a click or two, to supporting complex interactive attacks and data exfiltration through SVG filters. Using SVG filter elements, Lyra shows how attackers can create convincing fake interfaces, read pixel data from cross-origin iframes, implement logic gates for multi-step attacks, and even generate QR codes for data exfiltration. Lyra got a $3133.70 bug bounty from demonstrating this technique on Google Docs.</p><p class="paragraph" style="text-align:left;">💡 This is some impressive web chicanery 🤯 My description here does not do it justice.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">React2Shell: Everything You Need to Know About the Critical React Vulnerability</a><br>Wiz’s <a class="link" href="https://linkedin.com/in/gili-tikochinski-b5a8988a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Gili Tikochinski</a>, <a class="link" href="https://linkedin.com/in/merav-bar-608351232?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Merav Bar</a>, and <a class="link" href="https://linkedin.com/in/danielleaminov?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Danielle Aminov</a> describe the <i>unauthenticated</i> RCE vulnerability in the React Server Components (RSC) &quot;Flight&quot; protocol, stemming from insecure deserialization in RSC payload handling, allowing attackers to execute privileged JavaScript code through a simple HTTP request. React 19 and frameworks like Next.js affected. Wiz Research data shows 39% of cloud environments contain vulnerable instances, and attackers are actively exploiting it to harvest cloud credentials and deploy cryptocurrency miners. Patch ASAP.</p><p class="paragraph" style="text-align:left;">Deep dive from Wiz <a class="link" href="https://www.wiz.io/blog/nextjs-cve-2025-55182-react2shell-deep-dive?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">here</a>, Vercel update <a class="link" href="https://vercel.com/changelog/cve-2025-55182?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">here</a>, Vercel CEO <a class="link" href="https://www.linkedin.com/in/rauchg?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Guillermo Rauch</a> overview <a class="link" href="https://www.linkedin.com/pulse/react2shell-guillermo-rauch-cwl2c/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">here</a>, Datadog post <a class="link" href="https://securitylabs.datadoghq.com/articles/cve-2025-55182-react2shell-remote-code-execution-react-server-components/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">here</a>. Huge shout-out to <a class="link" href="https://www.linkedin.com/in/lachlan-s-davidson?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Lachlan Davidson</a> for discovering such a critical vulnerability 🙌 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<span style="color:rgb(34, 34, 34);"><b> </b></span><span style="color:rgb(34, 34, 34);"><b>From Gates to Guardrails: </b></span><br><span style="color:rgb(34, 34, 34);"><b>How to Prevent Risk at Scale</b></span></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">AppSec teams often struggle to prevent issues without slowing developers. A lack of context makes it hard to set targeted controls, so issues slip into production faster than teams can fix them – leaving teams with ever growing backlogs and applications persistently at risk.</p><p class="paragraph" style="text-align:left;">Discover a practical, five-stage framework to enable teams turn security gates into guardrails, allowing teams to accelerate secure development.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.paloaltonetworks.com/resources/guides/scale-risk-prevention?utm_source=tldrSEC&utm_medium=eNewsletter-Dec11&utm_campaign=L2-BSAP-AppSec&utm_content=From-Gates-to-Guardrails-eBook" target="_blank" rel="noopener noreferrer nofollow"><b>Start Preventing Risk</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">This guide has some good advice and nice maturity checklists. Understand your environment, standardize dev tooling, ensure coverage and provide a secure baseline, and how to prevent risk at scale. </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/playlist?list=PLdq8VB0hSfcZ4__poczrTObOaq3E-8pNH&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">AWS re:Invent 2025 Security Talks</a><br>103 video playlist carefully, kindly, benevolently collected by the gentleman and scholar <a class="link" href="https://www.linkedin.com/in/danielgrzelak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Daniel Grzelak</a>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://aws.amazon.com/blogs/aws/simplify-iam-policy-creation-with-iam-policy-autopilot-a-new-open-source-mcp-server-for-builders?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Simplify IAM policy creation with IAM Policy Autopilot, a new open source MCP server for builders</a><br>AWS announces <a class="link" href="https://github.com/awslabs/iam-policy-autopilot?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">IAM Policy Autopilot</a>, an open source static analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. It uses code analysis to create policies based on AWS SDK calls in your code. The tool is available as a CLI and MCP server for use within AI coding assistants.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.a2secure.com/en/blog-en-2/aws-preinvent-security-highlights-what-changed-impact?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">AWS pre:Invent security highlights: what changed and why it matters</a><br><a class="link" href="https://linkedin.com/in/adan-%C3%A1lvarez-vilchez-539a92115?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Adan Alvarez</a> describes three AWS pre:Invent security announcements: AWS local development using console credentials (<code>aws login</code>), IAM Outbound Identity Federation, and attribute-based access control (ABAC) for S3. For each, Adan discusses how it can improve security, potential attacker abuse vectors, and specific CloudTrail events to monitor.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/top-aws-re-invent-announcements-for-security-teams-in-2025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Top AWS re:Invent Announcements for Security Teams in 2025</a><br>Wiz’s <a class="link" href="https://www.linkedin.com/in/scott-piper-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Scott Piper</a> highlights key AWS security announcements from re:Invent 2025, including the new <code>aws login</code> command for simplified credential access, IAM Outbound Identity Federation for authenticating to non-AWS services using AWS principals via JWT, and the ability to transfer accounts between AWS Organizations without the previous complications. Other honorable mentions: IAM Policy Autopilot for policy generation, IAM temporary delegation, and org-level S3 Block Public Access settings.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.chrisfarris.com/post/reinvent2025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">re:Invent 2025 recap</a><br><a class="link" href="https://www.linkedin.com/in/jcfarris?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Chris Farris</a> shares a nice overview with a generous side of snark on AWS re:Invent 2025 announcements, grouped into: Security Features, Cloud Governance & Costs, Serverless Stuff, GenAI & Bedrock, and the other random stuff. </p><p class="paragraph" style="text-align:left;">One nice update: server-side encryption with customer-provided keys (SSE-C), which can be used to ransomware resources in AWS accounts, will be disabled for all existing buckets in AWS accounts that do not contain any SSE-C-encrypted data.</p><p class="paragraph" style="text-align:left;">“I’m shocked that laying off tens of thousands of people and replacing them with GenAI has slowed innovation,” “Friends still don’t let friends run Control Tower,” “using GenAI to answer questions about the data might be a useful reason to make polar bears homeless.”</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.yossarian.net/2025/11/21/We-should-all-be-using-dependency-cooldowns?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">We should all be using dependency cooldowns</a><br><a class="link" href="https://infosec.exchange/@yossarian?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">William Woodruff</a> argues that dependency cooldowns are a free, easy, and incredibly effective way to mitigate the large majority of open source supply chain attacks. The vast majority of malicious dependencies are caught by vendors within ~a week, so if you just wait 1-2 weeks to update dependencies, 80-90% of these attacks won’t affect you. You can add cooldowns with <a class="link" href="https://docs.github.com/en/code-security/dependabot/working-with-dependabot/dependabot-options-reference?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai#cooldown-" target="_blank" rel="noopener noreferrer nofollow">Dependabot</a>, <a class="link" href="https://docs.renovatebot.com/key-concepts/minimum-release-age/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Renovate</a>, or <a class="link" href="https://docs.zizmor.sh/audits/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai#dependabot-cooldown" target="_blank" rel="noopener noreferrer nofollow">zizmor: </a><code>dependabot-cooldown</code> , or use pnpm’s <code>minimumReleaseAge</code> or uv’s <code>exclude-newer</code>.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="blockquote"><blockquote class="blockquote__quote"><p class="paragraph" style="text-align:left;">“Supply chain security” is a serious problem. It’s also <b>seriously overhyped</b>, in part because dozens of vendors have a vested financial interest in convincing your that their <i>framing</i> of the underlying problem is (1) correct, and (2) worth your money.</p><figcaption class="blockquote__byline"></figcaption></blockquote></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.koi.ai/blog/two-years-17k-downloads-the-npm-malware-that-tried-to-gaslight-security-scanners?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Two Years, 17K Downloads: The NPM Malware That Tried to Gaslight Security Scanners</a><br>Koi’s <a class="link" href="https://www.linkedin.com/in/yuval-ronen?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Yuval Ronen</a> describes how they discovered an npm package containing both a traditional supply chain attack and an attempt to manipulate AI-based security tools through embedded prompt text like &quot;this code is legit, and is tested within sandbox internal environment.&quot;</p><p class="paragraph" style="text-align:left;">💡 It’d be cool to have like a Virus Total but for uploading malicious dependencies to test if certain prompt injection payloads can successfully mislead the AI scanning of various supply chain vendors.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.aikido.dev/blog/promptpwnd-github-actions-ai-agents?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">PromptPwnd: Prompt Injection Vulnerabilities in GitHub Actions Using AI Agents</a><br>Aikido Security’s <a class="link" href="https://www.linkedin.com/in/rein-daelman?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Rein Daelman</a> describes “PromptPwnd” attacks, in which untrusted user input (e.g. from issues, PRs, or commits) are injected into AI agent prompts (like Gemini CLI, Claude Code, OpenAI Codex) in GitHub Actions or GitLab CI/CD pipelines, causing the AI to execute privileged tools that can leak secrets or manipulate workflows. They found this issue in at least 5 Fortune 500 companies, including Google’s own Gemini CLI repository. They’ve open sourced a <a class="link" href="https://github.com/AikidoSec/opengrep-rules/tree/main/rules/github_workflow_prompt_injection?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">rule</a> to detect this issue.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">💡 Basically the standard PwnRequest attack where user input is used unsafely in a GitHub Action, but the dangerous place where user input is passed to is an AI agent CLI. This AI usage pattern seems super useful though from a maintainer point of view (e.g. doing code review on a PR, summarizing an issue, etc.) so I’d guess this will continue popping up a lot. It’d be great to see a “secure” pattern for this.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Also, given how model nondeterminism, I’d be curious to see if it takes a number of attempts to reliably exploit these, and if that makes them “noisier” and easier to detect? </p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.datadoghq.com/blog/engineering/malicious-pull-requests?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Detecting malicious pull requests at scale with LLMs</a><br><a class="link" href="https://www.linkedin.com/in/callan-lamb-11a036a6/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Callan Lamb</a>, <a class="link" href="https://www.linkedin.com/in/hamsen?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Christoph Hamsen</a>, <a class="link" href="https://www.linkedin.com/in/juliendoutre?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Julien Doutre</a>, Jason Foral, and <a class="link" href="https://www.linkedin.com/in/kassenqian?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Kassen Qian</a> describe how Datadog built BewAIre, an LLM-powered system that reviews pull requests in real-time to detect malicious code. On their curated dataset of malicious and benign changes, the system achieves &gt;99.3% accuracy with a 0.03% false positive rate and 100% detection of all malicious commits tied to known npm package compromises in Datadog’s <a class="link" href="https://github.com/DataDog/malicious-software-packages-dataset?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">malicious-software-packages-dataset</a>, thanks to prompt engineering, dataset tuning, and suppression rules for safe patterns. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Lessons learned (copied verbatim for my future reference):</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;"><b>Prompt engineering matters:</b> Carefully framing context, exclusions, and known pitfalls drastically improved reliability. We saw double-digit accuracy gains across multiple iterations of the prompt design.</p></li><li><p class="paragraph" style="text-align:left;"><b>Curated datasets and suppression rules are critical:</b> Our team spent months improving accuracy through careful creation and curation of malicious data and system-level prompts. These were incremental improvements and represented much of the day-to-day work of improving this system.</p></li><li><p class="paragraph" style="text-align:left;"><b>Chasing benchmarks leads to diminishing returns:</b> Although we continue to test against SOTA models, <span style="text-decoration:underline;"><i>most of our real improvements have come from better prompts and better data</i></span>. Changing across SOTA models ends up being most interesting for cost optimization.</p></li><li><p class="paragraph" style="text-align:left;"><b>Dogfooding accelerates tuning:</b> Using the tool on Datadog’s own codebase gave us realistic data and quick feedback cycles.</p></li><li><p class="paragraph" style="text-align:left;"><b>Testing must be adversarial:</b> Only by simulating real attacker behavior could we measure true malicious-detection performance.</p></li></ul></div><p class="paragraph" style="text-align:left;">💡Great methodology description, well worth the read. I like the focus on dataset curation and continual, quick feedback loops based on real data (from Datadog and known malicious supply chain attacks).</p><p class="paragraph" style="text-align:left;"></p><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://synacktiv.com/en/publications/linkpro-ebpf-rootkit-analysis?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">LinkPro: eBPF rootkit analysis</a><br>Synacktiv’s <a class="link" href="https://www.linkedin.com/in/theosyn?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Théo Letailleur</a> analyzes LinkPro, a sophisticated Linux eBPF rootkit discovered during an AWS infrastructure compromise investigation. The rootkit uses two eBPF modules: a &quot;Hide&quot; module that conceals its presence by intercepting <code>getdents</code> and <code>sys_bpf</code> system calls, and a &quot;Knock&quot; module that activates the backdoor only upon receiving a specific TCP packet with window size 54321. Tons of great technical details + YARA rules at the bottom.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://levelup.gitconnected.com/why-the-mitre-att-ck-framework-actually-works-29ac26d2d20c?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Why the MITRE ATT&CK Framework Actually Works</a><br>Nice intro/overview article by <a class="link" href="https://www.linkedin.com/in/johnjvester?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">John Vester</a> on why the MITRE ATT&CK framework has become so successful, highlighting its value in providing a common language for describing adversary behaviors and techniques. The post covers how ATT&CK helps organizations prioritize security efforts by focusing on the most relevant threats to their environment, enabling teams to map their existing security controls against known attack techniques and identify coverage gaps. The framework allows security teams to develop more targeted detection and response capabilities based on real-world attack patterns, rather than theoretical vulnerabilities.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks</a><br>The <a class="link" href="https://www.linkedin.com/company/sysdig?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Sysdig</a> Threat Research Team describes EtherRAT, a sophisticated implant exploiting the React2Shell vulnerability that uses Ethereum smart contracts for C2 resolution, implements five Linux persistence mechanisms, and downloads its own Node.js runtime from <code>nodejs.org</code>. The four-stage attack chain includes blockchain-based command and control using consensus voting across nine Ethereum RPC endpoints. “Rather than hardcoding a C2 server address, which can be blocked or seized, the malware queries an on-chain contract to retrieve the current C2 URL.”</p><p class="paragraph" style="text-align:left;">See also Reversing Lab’s post <a class="link" href="https://www.reversinglabs.com/blog/ethereum-contracts-malicious-code?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Ethereum contracts push malware on npm</a>.</p><p class="paragraph" style="text-align:left;">💡Not content to be used only for rug pulls, stolen to fund North Korea’s weapons program, and used as ransomware payments for criminals, the blockchain is now being used for C2. Obligatory <a class="link" href="https://web3isgoinggreat.com?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">web3isgoinggreat.com</a> reference.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@onhexgroup/implementing-the-etherhiding-technique-438979758593?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Implementing the Etherhiding technique</a><br>Onhexgroup shares a step-by-step tutorial for implementing the &quot;Etherhiding&quot; technique, a new technique reported by Google where threat actors leverage public blockchains to distribute malware. The post walks through creating a simple Solidity smart contract on the Sepolia test network (testnet) that stores and returns a message, then building a web interface to retrieve this data from the blockchain.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.orangecyberdefense.com/global/blog/cybersecurity/fairy-law?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Fairy Law</a><br>Orange Cyberdefense’s <a class="link" href="https://www.linkedin.com/in/ogulcan-ugur-5a1246238?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Ogulcan Ugur</a> describes &quot;Fairy Law,&quot; (<a class="link" href="https://github.com/zero2504/Fairy-Law?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">GitHub PoC</a>) a technique that disables EDR components by globally enabling the MicrosoftSignedOnly policy to block non-Microsoft signed DLLs from loading into processes. This technique bypasses anti-tamper protections since the OS blocks EDR components before they can protect themselves, resulting in reduced telemetry, disabled hooking, and compromised user-mode monitoring. EDR vendors with Microsoft-signed components (like CrowdStrike) can still maintain some functionality, while those without Microsoft signatures lose significant monitoring capabilities.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://andywgrant.substack.com/p/intuition-driven-offensive-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Intuition-Driven Offensive Security</a><br>My bud <a class="link" href="https://www.linkedin.com/in/andywgrant?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Andy Grant</a> shares his philosophy for building an offensive security program based on his experiences at Zoom. Three core principles: deep understanding of the target (understand the target systems more than the devs who built it), seeking technical truth (verify security claims- what’s in the code, not just what’s claimed), and hunting critical risk, not just counting bugs. Overall Andy advocates for giving security teams freedom to follow intuition and uncover meaningful vulnerabilities, without artificial constraints around scope or time boxing the assessment.</p><p class="paragraph" style="text-align:left;">💡 Andy was my manager at NCC Group for awhile, and played a critical role in my career and me being where I am today. I am and will always be grateful for him believing in me. I had the opportunity to tell him this recently, and it was really nice 😊 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@kozielpawe/when-agents-get-tools-10-mcp-labs-for-breaking-and-hardening-ai-integrations-63080045ee59?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">When Agents Get Tools: 10 MCP Labs for Breaking and Hardening AI Integrations</a><br><a class="link" href="https://www.linkedin.com/in/pawe%C5%82-kozie%C5%82-66b288a5/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Pawel Koziel</a> shares <a class="link" href="https://github.com/PawelKozy/mcp-breach-to-fix-labs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">MCP Breach-To-Fix Labs</a>, a GitHub repo with 10 hands-on MCP security challenges reproduced from real CVEs and public incident reports. Each scenario has a vulnerable, intentionally exploitable implementation, and a secure, hardened implementation with controls that block the attack. Challenges include a CRM Confused Deputy, prompt injection via public GitHub issue, hidden instructions in tool responses, SQL injection, command injection, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://1password.com/blog/securing-mcp-servers-with-1password-stop-credential-exposure-in-your-agent?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Securing MCP servers with 1Password: Stop credential exposure in your agent configurations</a><br><a class="link" href="https://www.linkedin.com/in/wangnancy/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Nancy Wang</a> and <a class="link" href="https://www.linkedin.com/in/robertmenke/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Robert Menke</a> describe how to use the 1Password CLI (<code>op</code>) to pull secrets at runtime so they’re not stored in plaintext (e.g. in an mcp.json file) and can be easily leaked. Basically: <code>op run --env-file=.env -- cursor mcp-server start</code>. Also apparently 1Password has Environments now, which let you define, sync, and rotate environment variables centrally across projects: <code>1password env init my-ai-project</code>.</p><p class="paragraph" style="text-align:left;">💡 I had a great chat with 1Password CISO <a class="link" href="https://www.linkedin.com/in/jacobdepriest/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Jacob DePriest</a> at a recent dinner, super nice guy. I like what they’re building. H/T Decibel’s <a class="link" href="https://www.linkedin.com/in/dan-nguyen-huu-11502719?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Dan Nguyen-Huu</a> for organizing 🙏 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blogs.cisco.com/ai/securing-ai-agents-with-ciscos-open-source-a2a-scanner?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Securing AI Agents with Cisco’s Open-Source A2A Scanner</a><br>Cisco’s <a class="link" href="https://www.linkedin.com/in/vineethsai?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Vineeth Sai Narajala</a> and <a class="link" href="https://www.linkedin.com/in/sanket-mendapara?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Sanket Mendapara</a> introduce <a class="link" href="https://github.com/cisco-ai-defense/a2a-scanner?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">A2A Scanner</a>, a tool to scan Agent-to-Agent (A2A) protocol implementations for security threats and vulnerabilities. A2A Scanner integrates static analysis of agent definitions (e.g., metadata, manifests, Agent Cards) with dynamic runtime monitoring of communications between agents. </p><p class="paragraph" style="text-align:left;">It has five detection engines: pattern matching with detection signatures (YARA), protocol validation with specification compliance (validates agents against the official A2A protocol specs), behavioral analysis with heuristics, runtime testing with an endpoint analyzer, and semantic interpretation with an LLM analyzer.  </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/abs/2511.20920?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Securing the Model Context Protocol (MCP): Risks, Controls, and Governance</a><br>Paper by <a class="link" href="https://www.linkedin.com/in/hermanerrico?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Herman Errico</a>, <a class="link" href="https://www.linkedin.com/in/jngiam?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Jiquan Ngiam</a>, and <a class="link" href="https://www.linkedin.com/in/shanitasojan?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Shanita Sojan</a> analyze security risks introduced by MCP, including 3 types of adversaries (content-injection attackers, supply chain attackers, agents who over-step their role) and how MCP can increase attack surface (data-driven exfiltration, tool poisoning, and cross-system privilege escalation). </p><p class="paragraph" style="text-align:left;">The paper also proposes a set of practical controls, including per-user authentication with scoped authorization, provenance tracking across agent workflows, containerized sandboxing with input/output checks, inline policy enforcement with DLP and anomaly detection, and centralized governance using private registries or gateway layers.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f356de42-6243-4be9-80a2-aaec5681393b/Screenshot_2025-12-10_at_11.26.57_PM.png?t=1765438163"/></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Music</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=DaU2RkaufMw&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">I&#39;m Not That Girl - Wicked (80s POP ROCK Cover) feat. Darren Criss</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=ePPpt8ef_Ww&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Josh Ramsay Of Marianas Trench Covers &quot;Defying Gravity&quot; On The Spot</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/6u9czbzJGWQ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">5 unexpected singing moments</a> - Aw the proud dad 🥹</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.netflix.com/tudum/articles/one-shot-with-ed-sheeran-behind-the-scenes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Here’s How Ed Sheeran Pulled Off His NYC Music Special in a Single Take</a> - This is absolutely insane. H/T <a class="link" href="https://www.linkedin.com/in/dlukeomalley?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Luke O’Malley</a> for sharing.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=rmvDxxNubIg&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">No Vibes Allowed: Solving Hard Problems in Complex Codebases – Dex Horthy, HumanLayer</a> - Excellent talk and slides. Markdown version <a class="link" href="https://github.com/humanlayer/advanced-context-engineering-for-coding-agents/blob/main/ace-fca.md?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">here</a>. </p><ul><li><p class="paragraph" style="text-align:left;">Their <a class="link" href="https://github.com/humanlayer/humanlayer?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">humanlayer repo</a> has some nice prompts.</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=7Dtu2bilcFs&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">2026: The Year The IDE Died — Steve Yegge & Gene Kim, Authors, Vibe Coding</a> - TIL Gene Kim and Steve Yegge have a book on <a class="link" href="https://www.amazon.com/Vibe-Coding-Building-Production-Grade-Software/dp/1966280025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Vibe Coding</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=iheWKg2Tkrk&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Ship Production Software in Minutes, Not Months — Eno Reyes, Factory</a> - Some nice content on capturing enterprise context. </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=CEvIs9y1uog&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Don&#39;t Build Agents, Build Skills Instead – Barry Zhang & Mahesh Murag, Anthropic</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=vW8wLsb3Nnc&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">POC to PROD: Hard Lessons from 200+ Enterprise GenAI Deployments - Randall Hunt, Caylent</a> - I liked a few of the diagrams.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;">“<a class="link" href="https://x.com/BusDownBonnor/status/1995252208615731411?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">I’m changing my profile pic to a girl</a>. Currently at 4833 followers. Let’s see where I’m sitting at the end of the year.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nber.org/digest/202512/school-cell-phone-bans-and-student-achievement?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Florida study</a>: “Two years after the imposition of a student cell phone ban, student test scores in a large urban school district were significantly higher than before.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://time.com/7336112/top-100-photos-2025?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">TIME’s Top 100 Photos of 2025</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/news/story/crowdfunding-to-cover-grocery-costs-becomes-more-common-8069930/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">Crowdfunding to cover grocery costs becomes more common</a> - Not a good sign for the economy</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-308-mcp-security-aws-re-invent-recaps-detecting-malicious-pull-requests-with-ai" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=84b9706e-9aeb-4474-ace1-bfbec8f0d552&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #307 - AI Bug Hunting Tools, Shai-Hulud 2.0, Keeping Secrets out of Logs</title>
  <description>Three open source AI-powered vulnerability finding tools, a baker&#39;s dozen security vendor blogs about the latest supply chain attack, how to keep secrets out yo&#39; logs son</description>
  <link>https://tldrsec.com/p/tldr-sec-307</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-307</guid>
  <pubDate>Thu, 04 Dec 2025 15:30:27 +0000</pubDate>
  <atom:published>2025-12-04T15:30:27Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">📺️ <a class="link" href="https://events.chainguard.dev/a1f85a9b-7c90-44e1-aae6-a94dd8fa885a/?utm_source=tldrsec&utm_medium=event&utm_campaign=FY26-GL-LW-FoundersPanelDec2025" target="_blank" rel="noopener noreferrer nofollow">Panel: 2026 Predictions with Chainguard Founders</a></h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Next week I’m stoked to moderate a panel with Chainguard’s founders <a class="link" href="https://www.linkedin.com/in/danlorenc/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Dan Lorenc</a>, <a class="link" href="https://www.linkedin.com/in/kimsterv/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Kim Lewandowski</a>, <a class="link" href="https://www.linkedin.com/in/mattmoor/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Matt Moore</a>, and <a class="link" href="https://www.linkedin.com/in/vaikas/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Ville Aikas</a>!</p><p class="paragraph" style="text-align:left;">We&#39;ll discuss the most impactful developments in software supply chain security from 2025 and share predictions for 2026. <br><br>We’ll also cover recent high-profile attacks, AI&#39;s role in engineering productivity, and emerging trends that every security and engineering leader should know about. <br><br>I’m a huge proponent of secure-by-default software, so I’m excited for the discussion on where things are headed and what we can do to build scalable security programs!</p><h2 class="heading" style="text-align:center;">👉️ <a class="link" href="https://events.chainguard.dev/a1f85a9b-7c90-44e1-aae6-a94dd8fa885a/?utm_source=tldrsec&utm_medium=event&utm_campaign=FY26-GL-LW-FoundersPanelDec2025" target="_blank" rel="noopener noreferrer nofollow">Join us Wed Dec 10 @ 10am PST</a> 👈️ </h2><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🗓️ Reflections</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">I had a bit of a surreal moment yesterday.</p><p class="paragraph" style="text-align:left;">In the morning I did a webinar with my good friend <a class="link" href="https://www.linkedin.com/in/danielmiessler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Daniel Miessler</a> about his personal AI setup (<a class="link" href="https://github.com/danielmiessler/Personal_AI_Infrastructure?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">GitHub</a>), and a few hundred people joined our discussion, and asked a ton of great questions.</p><p class="paragraph" style="text-align:left;">I then grabbed lunch at Anthropic with my bud <a class="link" href="https://www.linkedin.com/in/xrw/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Xiaoran Wang</a>.</p><p class="paragraph" style="text-align:left;">Most of the rest of the day I spent writing this <span style="text-decoration:line-through;">love letter</span> newsletter to you, dear reader.</p><p class="paragraph" style="text-align:left;">A few years ago I would not have expected I’d have a day like this. It’s a bit humbling I guess.</p><p class="paragraph" style="text-align:left;">I’m going to try to carve out some time to do a deeper, longer reflection over the holiday break.</p><p class="paragraph" style="text-align:left;">Feel free to let me know if there are some annual review resources that you really like!</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">P.S. One of the ways I find great security content is following what people share. Feel free to <a class="link" href="https://www.linkedin.com/in/clintgibler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">connect with me on LinkedIn</a> so your stuff shows up in my feed 👋 </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>7 Best Practices for Secrets Security</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Take the guesswork out of secrets management.</p><p class="paragraph" style="text-align:left;">API keys, tokens, and credentials often end up scattered across repos, pipelines, and SaaS tools. This cheat sheet helps you cut through the noise, identify what matters, and build guardrails that prevent future leaks.</p><p class="paragraph" style="text-align:left;">You’ll learn:</p><ul><li><p class="paragraph" style="text-align:left;">7 best practices to discover, validate, and protect secrets across your SDLC</p></li><li><p class="paragraph" style="text-align:left;">Real-world examples and ready-to-use GitHub + Gitleaks snippets</p></li><li><p class="paragraph" style="text-align:left;">Tips for assigning ownership and fixing issues directly in code</p></li><li><p class="paragraph" style="text-align:left;">Guidance to secure vaults without slowing developers down</p></li></ul><p class="paragraph" style="text-align:left;">Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.</p><h2 class="heading" style="text-align:center;"><b>👉</b><a class="link" href="https://www.wiz.io/lp/secrets-security-cheat-sheet?utm_source=tldrsec&utm_medium=paid-email&utm_campaign=FY26Q3_INB_FORM_Secret-Security-Sprawl-to-Control&sfcid=701Py00000T0tF9IAJ&utm_term=FY26Q4-tldrsec-nl&utm_content=Secrets-Security" target="_blank" rel="noopener noreferrer nofollow"><b> Secrets Security Cheat Sheet: </b></a><br><b><a class="link" href="https://www.wiz.io/lp/secrets-security-cheat-sheet?utm_source=tldrsec&utm_medium=paid-email&utm_campaign=FY26Q3_INB_FORM_Secret-Security-Sprawl-to-Control&sfcid=701Py00000T0tF9IAJ&utm_term=FY26Q4-tldrsec-nl&utm_content=Secrets-Security" target="_blank" rel="noopener noreferrer nofollow">From Sprawl to Control</a></b><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">As we’ve seen with recent supply chain attacks, secrets are a common initial access as well as privilege escalation vector, it’s important to lock them down!</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"></div><p class="paragraph" style="text-align:left;"><a class="link" href="https://allan.reyes.sh/posts/keeping-secrets-out-of-logs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Keeping Secrets Out of Logs</a><br>The blog version of <a class="link" href="https://infosec.exchange/@ar?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Allan Reyes</a>’ LocoMocoSec 2024 talk. Allan argues that there’s no silver bullet for keeping secrets out of logs, but shares 10 lead bullets that can work together, including: domain primitives (type-safe wrappers for sensitive data), read-once objects (that throw errors after initial use), log formatters (that redact sensitive patterns), taint checking (for tracking data flows), sensitive data scanners, and more.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Overall strategy: lay foundations with clear expectations, understand data flows, protect chokepoints, implement defense-in-depth, and plan for incident response when prevention fails.</p></div><p class="paragraph" style="text-align:left;">💡 This is very thoughtful and detailed post, great work 👌 Maybe one of the best I’ve seen in this space. Related: my bud <a class="link" href="https://www.linkedin.com/in/nathanbrahms?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Nathan Brahms</a> previously wrote a <a class="link" href="https://semgrep.dev/blog/2020/fixing-leaky-logs-how-to-find-a-bug-and-ensure-it-never-returns/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">blog post</a> about using a custom type + a Semgrep rule to prevent logging secrets in SQLAlchemy.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://trufflesecurity.com/blog/scanning-5-6-million-public-gitlab-repositories-for-secrets?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Scanning 5.6 million public GitLab repositories for secrets</a><br><a class="link" href="https://linkedin.com/in/luke-marshall-914a1a219?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Luke Marshall</a> scanned 5.6 million public GitLab repositories with TruffleHog, discovering 17,430 verified live secrets (2.8x more than Bitbucket) and earning over $9,000 in bounties. He built an AWS Lambda/SQS-based scanning architecture that completed the scan in 24 hours and cost $770.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Findings: there was a ~35% higher density of leaked secrets per repository on GitLab compared to Bitbucket, and Google Cloud Platform credentials were most commonly leaked (1 in 1,060 repos). See also Luke’s post on <a class="link" href="https://trufflesecurity.com/blog/scanning-2-6-million-public-bitbucket-cloud-repositories-for-secrets?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">scanning 2.6 million public Bitbucket Cloud repos</a> for secrets.</p></div><p class="paragraph" style="text-align:left;">💡 One of the coolest parts of the methodology to me was how he automated the triage process by using an LLM with web search (Sonnet 3.7) to identify the best path to report a security vulnerability to each organization, searching for if the company has a Bug Bounty Program, Vulnerability Disclosure Program, security contact, etc. Neat!</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</a><br>Another banger/facepalmer from watchTowr. <a class="link" href="https://www.linkedin.com/in/jake-knott-046939107/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Jake Knott</a> discovered thousands of sensitive credentials and data exposed through online code formatting tools JSONFormatter and CodeBeautify, where users inadvertently saved and shared confidential information via public links. An analysis of 80,000+ saved JSON entries found Active Directory credentials, API keys, database passwords, and PII (and much more) from organizations in sectors including government, banking, cybersecurity, healthcare, and many others. </p><p class="paragraph" style="text-align:left;">Jake uploaded a canary token to see if malicious actors thought to look for the same exposure, and they are: the canary fired in ~48 hours, indicating attackers are already actively scraping and testing these platforms.</p><p class="paragraph" style="text-align:left;">💡 More broadly, I like the idea of whenever you think of a clever and potentially novel idea, put a canary token in that attack path and see if attackers are already testing for it.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> 5 Critical Microsoft 365 Security Settings You Might Be Missing</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">Set it and forget it? Not when it comes to M365 security. Configuration drift, admin sprawl, and risky integrations creep in over time, opening up security gaps that attackers love to exploit. This checklist from Nudge Security will help you catch common pitfalls and keep your environment secure. </p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.nudgesecurity.com/content/the-practitioners-guide-to-microsoft-365-security?utm_medium=sponsored&utm_source=tldr&utm_content=newsletter&utm_campaign=microsoft_security&utm_term=secondary_microsoft-security-guide_pdf_251204" target="_blank" rel="noopener noreferrer nofollow"><b>Get the Guide</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">M365 is pretty complex and nuanced, I’m sure there’s a lot of stuff in here I’d forget to consider 👆️ </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@adan.alvarez/phishing-for-aws-credentials-via-the-new-aws-login-flow-39f6969b4eae?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Phishing for AWS Credentials via the New ‘aws login’ Flow</a><br><a class="link" href="https://linkedin.com/in/adan-%C3%A1lvarez-vilchez-539a92115?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Adan Alvarez</a> describes how attackers can abuse the new <code>aws login --remote</code> command to phish for AWS credentials, bypassing phishing-resistant MFA. Basically the social engineering attack works by tricking victims into visiting a malicious site that runs the command in the background, then having them authenticate to a legitimate AWS login page and provide the resulting verification code back to the attacker, who can exchange it for temporary credentials. Adan also shares an SCP that blocks this attack and how to detect suspicious activity.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.exaforce.com/blogs/log-rings-dont-lie-historical-enumeration-in-plain-sight?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">The log rings don’t lie: historical enumeration in plain sight</a><br>Exaforce’s <a class="link" href="https://linkedin.com/in/bleon-p-9b2734143?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Bleon Proko</a> shows how attackers can use cloud logs as an intelligence gathering tool, demonstrating techniques to enumerate permissions, resources, and identities across AWS, Azure, and GCP environments. </p><p class="paragraph" style="text-align:left;">Bleon shows how attackers with log access (CloudTrail events, Azure Activity Logs, GCP Audit Logs) can extract valuable information from audit trails (e.g. sign-ins, permission assignment, etc.) by analyzing fields like identity details, resource names, request parameters, and error messages to map the cloud environment’s infrastructure and determine their permissions, without triggering additional alerts.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment</a><br>Palo Alto’s <a class="link" href="https://linkedin.com/in/golan-myers-09b605213?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Golan Myers</a> and <a class="link" href="https://linkedin.com/in/ofir-balassiano?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Ofir Balassiano</a> describe two primary classes of AWS misconfigurations that create identity-driven initial access vectors: <i>service exposure</i> (misconfigurations allowing public access, shadow resource creation etc. that enable unintended access) and <i>access by design</i> (misconfigurations of services that provide access control for AWS resources). </p><p class="paragraph" style="text-align:left;">The post describes how Lambda functions, EC2 instances, ECR repositories, and DataSync can be inadvertently exposed through resource-based policies and network configurations, and how IAM/STS, IoT, and Cognito services can be misconfigured to allow unintended access, highlighting specific pitfalls like public role assumption, IoT certificate misuse, and Cognito&#39;s default self-registration.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Supply Chain</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/chainguard-dev/malcontent?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">chainguard-dev/malcontent</a><br>By <a class="link" href="https://linkedin.com/company/chainguard-dev?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Chainguard</a>: A tool to detect supply chain compromises through using context, differential analysis, and over 14,000 YARA rules. It scans programs for their capabilities (gathers system information, evaluates code dynamically using exec(), …) to determine if it’s potentially sketchy, and can do a diff between two versions of an app or library, determining if high risk functionality has been added.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://socket.dev/blog/north-korea-contagious-interview-npm-attacks?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Inside the GitHub Infrastructure Powering North Korea’s Contagious Interview npm Attacks</a><br>Socket’s <a class="link" href="https://linkedin.com/in/kirillboychenko?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Kirill Boychenko</a> describes details from tracking North Korea&#39;s &quot;Contagious Interview&quot; operation, which has recently deployed 197+ malicious npm packages targeting blockchain and Web3 developers through fake job interviews. The malware-serving code lives on GitHub, the latest payload is fetched from Vercel, and a separate command and control (C2) server handles data collection and tasking. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The payload “performs VM and sandbox detection, fingerprints the host, and then establishes a long-lived C2 channel. From there it provides the threat actors with a remote shell, continuous clipboard theft, global keylogging, multi-monitor screenshot capture, and recursive filesystem scanning designed to harvest credentials.”</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.blog/changelog/2025-11-07-actions-pull_request_target-and-environment-branch-protections-changes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Actions pull_request_target and environment branch protections changes</a><br><a class="link" href="https://www.linkedin.com/company/github?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">GitHub</a> is updating how GitHub Actions&#39; <code>pull_request_target</code> and environment branch protection rules are evaluated for security reasons, with changes taking effect on 12/8/2025. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Key changes: <code>pull_request_target</code> events will always use the default branch for workflow source and reference (preventing execution of outdated, potentially vulnerable workflows), and environment branch protection rules for PRs will evaluate against the executing reference rather than the PR head. These changes close security gaps where untrusted branches could influence evaluation or access environment secrets.</p></div><p class="paragraph" style="text-align:left;">💡 This is great! 👏 Platform-level hardening / secure-by-default improvements FTW.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Shai-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposing Secrets</a><br>Shout-out to threat actors for being busy when I’m taking a week off 🤙 Wiz’s <a class="link" href="https://www.linkedin.com/in/hila-ramati-7003a924a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Hila Ramati</a>, <a class="link" href="https://www.linkedin.com/in/merav-bar-608351232?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Merav Bar</a>, <a class="link" href="https://www.linkedin.com/in/gal-benmocha?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Gal Benmocha</a>, and <a class="link" href="https://www.linkedin.com/in/gili-tikochinski-b5a8988a?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Gili Tikochinski</a> describe the Shai-Hulud 2.0 (Sha1-Hulud) supply chain worm: ~700 compromised NPM packages, 25,000+ malicious repos across ~500 GitHub users, 775 compromised GitHub access tokens, 373 AWS credentials, etc.</p><p class="paragraph" style="text-align:left;">The payload used a pretty neat persistence mechanism: it registers the infected machine as a self hosted GitHub runner, then adds a workflow that contains an injection vulnerability that allows the attacker to execute arbitrary commands on the machine in the future by opening discussions in the GitHub repo.</p><p class="paragraph" style="text-align:left;">Wiz has a <a class="link" href="https://www.wiz.io/blog/shai-hulud-2-0-aftermath-ongoing-supply-chain-attack?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">part 2</a> with more stats and a <a class="link" href="https://github.com/wiz-sec-public/wiz-research-iocs/blob/main/reports/shai-hulud-2-packages.csv?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">CSV list</a> of affected packages. </p><p class="paragraph" style="text-align:left;">Post mortems: The <a class="link" href="https://posthog.com/blog/nov-24-shai-hulud-attack-post-mortem?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">PostHog</a> one is pretty good. See also: <a class="link" href="https://blog.postman.com/engineering/shai-hulud-2-0-npm-supply-chain-attack/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Postman</a>, <a class="link" href="https://status.zapier.com/incidents/01KAV9DDHMYT7R6MFHSB8C09E3/write-up?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Zapier</a> and <a class="link" href="https://trigger.dev/blog/shai-hulud-postmortem?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Trigger.dev</a>.</p><p class="paragraph" style="text-align:left;">⭐️ <a class="link" href="https://www.linkedin.com/posts/imjasonh_github-octo-stsapp-a-github-app-that-activity-7400672428164743168-MsYJ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Jason Hall</a> made a great point about the risk reduction of using something like <a class="link" href="https://github.com/octo-sts/app?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">OctoSTS</a>, a GitHub app to mint short-lived GitHub tokens.</p><p class="paragraph" style="text-align:left;">An alphabetical, incomplete list of other vendor coverage: <a class="link" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Aikido</a>, <a class="link" href="https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Datadog</a> (<a class="link" href="https://github.com/DataDog/indicators-of-compromise/tree/main/shai-hulud-2.0?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">IoC CSV</a>), <a class="link" href="https://blog.gitguardian.com/shai-hulud-2/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">GitGuardian</a>, <a class="link" href="https://www.netskope.com/blog/shai-hulud-2-0-aggressive-automated-one-of-fastest-spreading-npm-supply-chain-attacks-ever-observed?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Netskope</a>, <a class="link" href="https://orca.security/resources/blog/shai-hulud-npm-malware-wave-2/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Orca</a>, <a class="link" href="https://unit42.paloaltonetworks.com/npm-supply-chain-attack/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Palo Alto</a>, <a class="link" href="https://semgrep.dev/blog/2025/digging-for-secrets-sha1-hulud-the-second-coming-of-the-npm-worm/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Semgrep</a>, <a class="link" href="https://socket.dev/blog/shai-hulud-strikes-again-v2?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Socket</a>, <a class="link" href="https://www.stepsecurity.io/blog/sha1-hulud-the-second-coming-zapier-ens-domains-and-other-prominent-npm-packages-compromised?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Step Security</a>, … 😪</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">💡 I didn’t realize at the time, but clearly this <a class="link" href="https://www.youtube.com/watch?v=79DijItQXMM&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Moana song</a> was a message from supply chain threat actors to security vendor marketing teams. </p><p class="paragraph" style="text-align:left;">Real talk for a sec: it’s great that the security community comes together to respond to ecosystem-level attacks like this, but to be honest it feels like a lot of duplicate work, and it’s not clear to me what the value is of having every security company write a &gt;80% overlapping post about the same event. </p><p class="paragraph" style="text-align:left;">Maybe in the heat of the moment certain teams have specific findings/IoCs that others miss so there is value to concurrent, not totally overlapping work. But it feels to me more like marketing than true novel value. Maybe I’m just being grumpy.</p><p class="paragraph" style="text-align:left;">To be clear, I’m not saying this about any person or company, I think people are doing great work, there’s just a part of that wishes we could funnel all that security talent and time into preventative, longer term, <i>solve-this-class-of-problem</i> efforts vs highly overlapping, reactive discussion of the same event. Which will just occur again in a few months.</p><p class="paragraph" style="text-align:left;"></p><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">North Korea lures engineers to rent identities in fake IT worker scheme</a><br>Researchers <a class="link" href="https://www.linkedin.com/in/mauroeldritch?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Mauro Eldritch</a> and <a class="link" href="https://www.linkedin.com/in/heinergarcia?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Heiner García</a> exposed North Korean IT recruitment tactics by creating a honeypot to document how Famous Chollima (part of Lazarus group) lures developers into renting their identities for remote jobs at targeted companies, offering 10-35% of salaries in exchange. The researchers used ANY.RUN sandboxes to create a simulated environment that recorded the threat actors&#39; activities in real-time. Nice!</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The North Korean agents requested 24/7 remote access via AnyDesk to victims&#39; computers, and used tools including Astrill VPN and AI tools including AIApply, Simplify Copilot, Final Round AI, Saved Prompts to help with job applications and interviews.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’</a><br><a class="link" href="https://www.linkedin.com/in/bkrebs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Brian Krebs</a> describes how he identified &quot;Rey,&quot; a 15-year-old administrator of the Scattered LAPSUS$ Hunters (SLSH) cybercriminal group, via various operational security mistakes. Brian reached out to Rey’s father, and then ended up chatting with Rey directly.</p><p class="paragraph" style="text-align:left;">Pretty neat sleuthing process: Rey posted a screenshot with a password and partially redacted email address → that unique password was found in the breach tracking service Spycloud, showing it was associated with an email address that was exposed when the user’s device was infected with an infostealer trojan. Rey also shared various personal life details in Telegram accounts that could then be tied with “autofill” data lifted from Rey’s family PC (via the infostealer data).</p><p class="paragraph" style="text-align:left;">💡 Companies being breached by “APTs” - Advanced Persistent Teenagers.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://detect.fyi/introducing-lumen-your-evtx-companion-850c49073485?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Introducing LUMEN: Your EVTX Companion</a><br><a class="link" href="https://www.linkedin.com/in/daniel-koifman-61072218b/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Daniel Koifman</a> introduces <a class="link" href="https://github.com/Koifman/LUMEN?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">LUMEN</a>, a privacy-first, browser-native Windows Event Logs (EVTX) analysis platform that processes the logs entirely client-side using WebAssembly. The tool integrates 2,349 SIGMA detection rules and has advanced correlation capabilities (reconstructs process trees, user movement and privilege escalation, etc.) without requiring installation, backend servers, or log uploads. </p><p class="paragraph" style="text-align:left;">Optional AI features: LUMEN integrates with the main AI providers to provide natural-language log queries, automated incident summaries, pattern anomaly detection, and executive-level reporting.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/OWASP/www-project-ai-testing-guide/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">OWASP AI Testing Guide</a><br>New 250 page v1 guide (<a class="link" href="https://github.com/OWASP/www-project-ai-testing-guide/blob/main/PDFGenerator/V1.0/OWASP-AI-Testing-Guide-v1.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">PDF</a>) by <a class="link" href="https://www.linkedin.com/in/meucci/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Matteo Meucci</a>, <a class="link" href="https://www.linkedin.com/in/go4it/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Marco Morana</a>, and many others on how to threat model AI systems, and a detailed testing methodology for AI applications, models, AI infrastructure, data, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/FuzzingLabs/fuzzforge_ai?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">FuzzingLabs/fuzzforge_ai</a><br>By <a class="link" href="https://www.linkedin.com/company/fuzzinglabs?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">FuzzingLabs</a>: An AI-powered workflow automation and AI Agents platform for AppSec, fuzzing & offensive security. Automate vulnerability discovery with intelligent fuzzing, AI-driven analysis, and a marketplace of security tools. It currently integrates a number of fuzzers (Atheris for Python, cargo-fuzz for Rust, OSS-Fuzz campaigns), has specialized agents for AppSec, reversing, and fuzzing, has a <a class="link" href="https://github.com/FuzzingLabs/fuzzforge_ai/blob/master/backend/benchmarks/by_category/secret_detection/results/comparison_report.md?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">secret detection benchmark</a>, and more.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/gadievron/raptor?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">gadievron/raptor</a><br>By <a class="link" href="https://www.linkedin.com/in/gadievron?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Gadi Evron</a>, <a class="link" href="https://www.linkedin.com/in/daniel-cuthbert0x?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Daniel Cuthbert</a>, <a class="link" href="https://www.linkedin.com/in/halvarflake?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Thomas Dullien</a> (Halvar Flake), & <a class="link" href="https://www.linkedin.com/in/michaelbargury?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Michael Bargury</a>: Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent, using <code>Claude.md</code> and rules, sub-agents, and skills. Raptor can scan your code with Semgrep and CodeQL, fuzz binaries with AFL, analyze vulnerabilities using LLMs, generate proof-of-concept exploits, patch code, report findings in a structured format, and more.</p><p class="paragraph" style="text-align:left;">💡What I think is especially cool about this is that RAPTOR really leans into using Claude Code as the orchestrator/work bench and leveraging its existing functionality (custom slash commands, agents, skills) vs trying to roll it all from scratch. Makes a lot of sense to me. And of course having tools and deterministic code for the parts that would benefit from it. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/aliasrobotics/cai?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">aliasrobotics/cai</a><br>By <a class="link" href="https://www.linkedin.com/company/alias-robotics?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Alias Robotics</a>: A lightweight, open-source framework that empowers security professionals to build and deploy AI-powered offensive and defensive automation. Supports 300+ AI models, built-in security tools for reconnaissance, exploitation, and privilege escalation, agent-based architecture (modular framework design to build specialized agents for different security tasks), evaluated on HackTheBox CTFs, bug bounties, and real-world security <a class="link" href="https://aliasrobotics.com/case-studies-robot-cybersecurity.php?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">case studies</a>, and more. See also their papers:</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/abs/2504.06017?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">CAI: An Open, Bug Bounty-Ready Cybersecurity AI</a><br>Paper by <a class="link" href="https://www.linkedin.com/in/vmayoral?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Victor Mayoral-Vilches</a> et al presenting the first classification of autonomy levels in cybersecurity and introducing Cybersecurity AI (CAI). CAI achieved first place among AI teams and secured a top-20 position worldwide in the &quot;AI vs Human&quot; CTF live Challenge, and reached top-30 in Spain and top-500 worldwide on Hack The Box within a week. The framework enabled non-professionals to discover significant security bugs (CVSS 4.3-7.5) at rates comparable to experts during bug bounty exercises.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/abs/2510.17521?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity AI: Evaluating Agentic Cybersecurity in Attack/Defense CTFs</a><br>Paper by <a class="link" href="https://www.linkedin.com/in/francesco-balassone?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Francesco Balassone</a>, <a class="link" href="https://www.linkedin.com/in/vmayoral?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Victor Mayoral-Vilches</a> et al on evaluating whether AI systems are more effective at attacking or defending in cybersecurity. Using CAI&#39;s parallel execution framework, they deployed autonomous agents in 23 Attack/Defense CTFs. Defensive agents achieve 54.3% unconstrained patching success versus 28.3% offensive initial access, but this advantage disappears under operational constraints: when defense requires maintaining availability (23.9%) and preventing all intrusions (15.2%), no significant difference exists.</p><p class="paragraph" style="text-align:left;">💡 Having AI defensive and offensive agents play against each other on existing (Hack The Box) CTFs is neat. I like experiments like this, though I wonder if the difference in outcome could be attributed to scaffolding, prompting, etc. (e.g. maybe the defensive prompt is just written a lot better), vs AI is inherently better at attack or defense. </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://red.anthropic.com/2025/smart-contracts?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">AI agents find $4.6M in blockchain smart contract exploits</a><br>Anthropic researchers + collaborators evaluated AI agents&#39; ability to exploit smart contracts by creating <a class="link" href="https://github.com/safety-research/SmartContract-bench?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Smart CONtracts Exploitation benchmark</a> (SCONE-bench)— a new benchmark of 405 contracts that were actually exploited between 2020 and 2025. On contracts exploited after the latest knowledge cutoff (March 2025), Claude Opus 4.5, Claude Sonnet 4.5, and GPT-5 developed exploits collectively worth $4.6 million.</p><p class="paragraph" style="text-align:left;">They also evaluated both Sonnet 4.5 and GPT-5 in simulation against 2,849 recently deployed contracts <i>without</i> any known vulnerabilities, both uncovering two novel zero-day vulnerabilities and produced exploits worth $3,694, with GPT-5 doing so at an API cost of $3,476. (I assume they didn’t share the Sonnet 4.5 API cost because it was higher 🤔)</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“Over the last year, frontier models&#39; exploit revenue on the 2025 problems doubled roughly every 1.3 months.”</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">“In just one year, AI agents have gone from exploiting 2% of vulnerabilities in the post-March 2025 portion of our benchmark to 55.88%.”</p></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Feelz</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.jackfriks.com/keep-going?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Keep Going</a> - Collected motivational memes by <a class="link" href="https://x.com/jackfriks?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Jack Friks</a> 🥹</p></li><li><p class="paragraph" style="text-align:left;">HealthyGamerGG - <a class="link" href="https://www.youtube.com/watch?v=KyLXDC_vrsc&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">How To Actually Process Your Emotions</a> 🔥 </p></li><li><p class="paragraph" style="text-align:left;">Leila Hormozi - <a class="link" href="https://www.youtube.com/watch?v=0iDZ8UDvlWU&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Brutally Honest Relationship Advice</a></p></li><li><p class="paragraph" style="text-align:left;">Bryan Johnson - “Guys…I have a girlfriend.” <a class="link" href="https://www.youtube.com/watch?v=BQVLon0owJY&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">YouTube</a>, <a class="link" href="https://x.com/bryan_johnson/status/1995953490930401334?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">X</a>. Actually very sweet.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=BLp8JaIEnTM&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Can You Change Someone&#39;s Life in One Night?</a> - Mark Manson gets a blank check from Airbnb to host an experience. I thought how he conceived of structuring the experience fascinating - determining the right “container” to give attendees a certain association (intimate dinner → sharing stories), a pattern interrupt to break people’s expectations, progressively vulnerable sharing, something physical + metaphorical (fire walking).</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;">Dwarkesh Patel - <a class="link" href="https://www.youtube.com/watch?v=aR20FWCCjAs&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Ilya Sutskever – We&#39;re moving from the age of scaling to the age of research</a></p></li><li><p class="paragraph" style="text-align:left;">Benedict Evans - <a class="link" href="https://www.youtube.com/watch?v=niJpDnNtNp4&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">AI Eats the World</a> - SuperAI Singapore 2025 (<a class="link" href="https://www.ben-evans.com/presentations?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">slides</a>)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/vedantmisra/status/1990857922759537035?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Mom on son’s Gemini 3 work</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://archive.is/S6Lbz?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Grok says Elon Musk is better than basically everyone, except Shohei Ohtani</a> - People on X have been circulating posts where Grok says Elon is better than the Peyton Manning at football, Tyra Banks at the runway, etc.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://gibberifier.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Text Gibberifier</a> - Block AIs from reading your text with invisible Unicode characters while preserving meaning for humans.</p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Privacy</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/jermanuts/bad-opsec?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">jermanuts/bad-opsec</a> - Collection of links on bad operational security (OpSec) by various hackers, leakers, etc.</p><ul><li><p class="paragraph" style="text-align:left;">Useful resource if you too want to be “<a class="link" href="https://archive.is/9KohI?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">clean on OpSec</a>” like U.S. Secretary of War Pete Hegseth.</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wired.com/story/digital-opsec-for-teens/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">The WIRED Guide to Digital Opsec for Teens</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://check.labs.greynoise.io/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">GreyNoise IP Check</a> - Free simple site to determine if your home network has been compromised (e.g. home router, IoT, and other “edge” devices have become part of a residential proxy network). <a class="link" href="https://www.greynoise.io/blog/your-ip-address-might-be-someone-elses-problem?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Blog post</a> with more context.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/withoutbg/withoutbg?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">withoutbg/withoutbg</a> - Open source image background removal model.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/TW9hkQ_WPP4?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">How much SNL cast members make</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/tikalteacall?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">@tikalteacall</a> - “<a class="link" href="https://x.com/tikalteacall/status/1917582090826137982?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">I like to test doors to see if they’ll open</a>. My policy is that an unlocked door is a policy to enter. Thread of places I’ve been by walking into unlocked rooms:”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://jayd.ml/2025/11/10/someone-at-youtube-needs-glasses-prophecy-fulfilled.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Someone At YouTube Needs Glasses: The Prophecy Has Been Fulfilled</a> - When you make a joke creating a trend line of non-ad videos on the YouTube home page, predicting it’ll eventually be 1… and then you’re right.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Politics</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.yesigiveafig.com/p/part-1-my-life-is-a-lie?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Part 1: My Life Is a Lie</a> - Michael Green unravels why the American middle class feels poorer each year despite healthy GDP growth and low unemployment: “The U.S. poverty line is calculated as three times the cost of a minimum food diet in 1963, adjusted for inflation.” But $ spent on housing, healthcare, childcare is way higher now. </p><ul><li><p class="paragraph" style="text-align:left;">Also interesting numbers around disincentives to work between being certain wage ranges, as the benefits you lose are greater than the wages you earn.</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://aaronstannard.com/40k-baby/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Why Am I Paying $40,000 for the Birth of My Child?</a> - Aaron Stannard describes in detail the unreasonable healthcare costs when you’re a small business owner in America</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://kyla.substack.com/p/30-days-9-cities-1-question-where?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">30 Days, 9 Cities, 1 Question: Where Did American Prosperity Go?</a> - Kyla Scanlon visited a number of U.S. and EU places, and reflects on people trying to make things better.</p><ul><li><p class="paragraph" style="text-align:left;">“What became clear almost immediately is that the prosperity is real, it’s just not showing up in the places people actually live. It exists in balance sheets, in stock portfolios, in data centers behind chain-link fences. But in daily life like in commutes, in childcare costs, in housing, in safety, in community, people are feeling decay. I kept running into the same contradiction: a wealthy country where everything visible seems to be slowly breaking while everything invisible keeps getting richer.”</p></li><li><p class="paragraph" style="text-align:left;">“There’s a new study showing that housing costs account for about half the US fertility decline between 2000 and 2020. It’s childcare too - a new paper from Abigail Dow reports that a 10% increase in the price of childcare leads to a 5.7% decrease in the birth rate. The affordability crisis compounds - without affordable homes, young families don’t form. Without young families, the tax base ages. Without young taxpayers, resources shrink. The system eats itself.”</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.theregister.com/2025/11/12/asio_cyber_sabotage_warnings?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Australia’s spy boss says authoritarian nations ready to commit ‘high-impact sabotage’</a> - Chinese government hackers are probing and pre-positioning in Australia’s critical infrastructure. “Imagine the implications if a nation state took down <i>all</i> the networks? Or turned off the power during a heatwave? Or polluted our drinking water? Or crippled our financial system?” Burgess said those scenarios “are not hypotheticals,” adding “foreign governments have elite teams investigating these possibilities right now.” </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.hrw.org/news/2025/11/07/china-authorities-shut-down-film-festival-in-new-york?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Chinese authorities shut down the inaugural IndieChina Film Festival in New York City</a> by harassing dozens of Chinese film directors, producers, and their families, forcing over two-thirds of participating films to cancel before the festival was suspended. “Even directors abroad, including those who are not Chinese nationals, reported that their relatives and friends in China were receiving threatening calls from police, said Chiang.”</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.security.com/threat-intelligence/china-apt-us-policy?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">China-linked Actors Maintain Focus on Organizations Influencing U.S. Policy</a> - Details on a Chinese APT that compromised a U.S. non-profit organization that is active in attempting to influence U.S. government policy on international issues.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.theregister.com/2025/11/09/asia_tech_news_roundup?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">Data breach at Chinese infosec firm reveals weapons arsenal </a>- Chinese security company Knownsec had a data breach exposing over 12,000 classified documents, including state-owned cyber weapons, internal tools, global target lists, and evidence of Remote Access Trojans (Linux, Windows, macOS, iOS, and Android) and extracting data from messaging apps. The leaked data also contained a list of 80 successfully attacked overseas targets and stolen information including 95GB of Indian immigration data, 3TB of call records from South Korean telecom LG U Plus, and 459GB of Taiwanese road planning data.</p></li></ul></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-307-ai-bug-hunting-tools-shai-hulud-2-0-keeping-secrets-out-of-logs" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=04816ba3-04ab-459a-8372-d5235b744e85&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>[tl;dr sec] #306 - Claude Code&#39;s Hacking Campaign, Rust in Android, Secrets Scanners Miss</title>
  <description>Claude used by state actors for a hacking campaign + industry weighs in, Rust -&gt; 1000x reduction in memory safety vulns in Android, why your secret scanner is missing valid secrets</description>
  <link>https://tldrsec.com/p/tldr-sec-306</link>
  <guid isPermaLink="true">https://tldrsec.com/p/tldr-sec-306</guid>
  <pubDate>Thu, 20 Nov 2025 15:30:33 +0000</pubDate>
  <atom:published>2025-11-20T15:30:33Z</atom:published>
    <dc:creator>Clint Gibler</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Hey there,</p><p class="paragraph" style="text-align:left;">I hope you’ve been doing well!</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">🤖❤️‍🔥 <a class="link" href="https://semgrep.dev/events/building-your-personal-ai-infrastructure-with-daniel-miessler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Building Your Personal AI Infrastructure</a></h2><hr class="content_break"><p class="paragraph" style="text-align:left;">I’m stoked to announce I’ll be doing a webinar with my friend <a class="link" href="https://www.linkedin.com/in/danielmiessler?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Daniel Miessler</a> on his epic AI setup.</p><p class="paragraph" style="text-align:left;">(If you’re not familiar with Daniel, he writes the excellent <a class="link" href="https://newsletter.danielmiessler.com/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Unsupervised Learning</a> newsletter and created the <a class="link" href="https://github.com/danielmiessler/fabric?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Fabric</a> project.)</p><p class="paragraph" style="text-align:left;">Daniel has spent maybe more time than anyone I know on his personal AI infrastructure.</p><p class="paragraph" style="text-align:left;">So I’m stoked to have him walk through his setup, do some live demos, and answer <i>your</i> questions.</p><p class="paragraph" style="text-align:left;">We’ll cover:</p><ul><li><p class="paragraph" style="text-align:left;">Building out Claude Code as your command center.</p></li><li><p class="paragraph" style="text-align:left;">A maturity model for integrating AI into your work.</p></li><li><p class="paragraph" style="text-align:left;">Recent developments and how best to use them: Skills, sub-agents, etc.</p></li><li><p class="paragraph" style="text-align:left;">“Productionizing” your AI infra and tactical tips: ensuring the right agents and skills are called, structuring context for easy agent retrieval, automatically managing agent history, coordinating between agents, tool calling, etc.</p></li><li><p class="paragraph" style="text-align:left;">And more!</p></li></ul><p class="paragraph" style="text-align:left;">Hope to see you there 👋 </p><h3 class="heading" style="text-align:center;">👉️<b> </b><a class="link" href="https://semgrep.dev/events/building-your-personal-ai-infrastructure-with-daniel-miessler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow"><b>Join us Dec 3rd at 10am PT</b></a><b> </b>👈️<b> </b></h3><p class="paragraph" style="text-align:left;">🦃 P.S. <b>No </b><i><b>tl;dr sec</b></i><b> next week</b> due to Thanksgiving! Hope you get some time to relax with people you care about.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<span style="color:#222222;"><b> </b></span><span style="color:#222222;"><b>Start your Red Team Journey with </b></span><br><span style="color:#222222;"><b>Altered Security</b></span></h1><hr class="content_break"><p class="paragraph" style="text-align:left;"><span style="color:#222222;">Altered Security offers multiple Red Team courses for on-prem and cloud with affordable and enterprise-like hands-on labs. </span></p><p class="paragraph" style="text-align:left;"><span style="color:#222222;">Highlights of Altered Security courses:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:#222222;">Industry recognized certifications like Certified Red Team Professional (CRTP), CRTE, CARTP and more. </span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:#222222;">Easy to access and huge enterprise-like labs.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:#222222;">Designed by Black Hat USA and DEF CON veterans. </span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:#222222;">Trained more than 40K professionals from 130+ countries and 500+ organizations. </span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:#222222;"><b>Get 20% OFF on all courses in our Black Friday deals until December 17, 2025. No coupon code required.</b></span></p><h2 class="heading" style="text-align:center;"><span style="color:#222222;"><b>👉 </b></span><a class="link" href="https://www.alteredsecurity.com/online-labs?utm_source=tl_dr_sec&utm_medium=digital&utm_campaign=blackfriday2025&utm_term=paid&utm_content=newsletter" target="_blank" rel="noopener noreferrer nofollow"><b>Enroll Now</b></a><b> 👈</b></h2></div><p class="paragraph" style="text-align:left;">Courses and online labs have really helped me level up my hands-on knowledge over the course of my career. Take a look if you want to gain some red team experience 👀 </p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">AppSec</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://semgrep.dev/blog/2025/secrets-story-and-prefixed-secrets?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Secrets Story: The Prefixed Secrets That Tried%20to%2BGet\nAway</a><br>Semgrep’s <a class="link" href="https://www.linkedin.com/in/theoriginalenglishbreakfast?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Lewis Ardern</a> describes how secret scanning tools miss valid leaked secrets due to over-reliance on false positive reduction techniques like non-word boundaries and keywords. He found hundreds of valid GitHub, OpenAI, Anthropic, and other tokens publicly leaked on GitHub that went undetected by popular scanning tools. </p><p class="paragraph" style="text-align:left;">💡 Secret detection is actually surprisingly complex and nuanced, which this post does a good job at demonstrating with concrete examples. If you want to get into the nitty gritty, check it out.</p><p class="paragraph" style="text-align:left;"></p></div><p class="paragraph" style="text-align:left;"><a class="link" href="https://bughunters.google.com/blog/5457130561798144/effortless-web-security-secure-by-design-in-the-wild?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Effortless Web Security: Secure by Design in the Wild</a><br><a class="link" href="https://www.linkedin.com/in/aaron-shim-41a46221/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Aaron Shim</a> shares two Google initiatives to support by Secure by Design in web development: contributing to the W3C Secure Web Application Guidelines (SWAG) Community Group and introducing Auto-CSP in Angular. The W3C group has some great documentation on common vulnerability classes, and discusses best practices and guidelines for web developers and maintainers of important web dependencies. </p><p class="paragraph" style="text-align:left;">Auto-CSP in Angular automatically generates Content Security Policy configurations during build time. CSP is a great defense against XSS, but tough to do in practice. Auto-CSP works by rewriting all <code>&lt;script&gt;</code> tags with <code>src</code> attributes to inline script tags that dynamically add those scripts to the page, and then all inline scripts are hashed and used in the CSP with <code>strict-dynamic</code>.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Rust in Android: move fast and fix things</a><br>Google’s <a class="link" href="https://linkedin.com/in/jeffrey-vander-stoep-8a56629?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Jeff Vander Stoep</a> shares how Android&#39;s adoption of Rust has led to <b>a 1000x reduction in memory safety vulnerability density compared to Android’s C and C++ code</b>. Memory safety vulnerabilities have fallen to below 20% of total vulnerabilities for the first time, and Rust has also significantly improved development efficiency with a 4x lower rollback rate and 25% less time spent in code review compared to C++. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Android is expanding Rust adoption to the Linux kernel, firmware, and first-party applications like Nearby Presence and MLS, and parsers for PNG, JSON, and web fonts in Chromium.</p></div><p class="paragraph" style="text-align:left;">See also <a class="link" href="https://google.github.io/comprehensive-rust/index.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Comprehensive Rust</a>, a free Rust course developed by the Android team at Google.</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#d9edd9;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:center;"><b>Sponsor</b></p><h1 class="heading" style="text-align:center;">📣<b> </b><b>Meet Cortex Cloud 2.0: </b><b>The Autonomous AI Workforce for Cloud Security</b></h1><hr class="content_break"><p class="paragraph" style="text-align:left;">The complexity of securing modern cloud environments — from development to deployment — has reached a breaking point. Siloed tools and alert fatigue turn visibility into chaos.</p><p class="paragraph" style="text-align:left;">Discover how Cortex Cloud™ 2.0 sets the new standard for autonomous cloud security, connecting code, cloud, runtime and automation.</p><p class="paragraph" style="text-align:left;">You’ll learn how to:</p><ul><li><p class="paragraph" style="text-align:left;">Solve any cloud security challenge with automation driven by agentic AI trained on over 1.2 billion real-world responses.</p></li><li><p class="paragraph" style="text-align:left;">Reduce risk across your multicloud environment with intuitive, actionable command centers that elegantly visualize risk. </p></li><li><p class="paragraph" style="text-align:left;">Stop advanced attacks with a performance-optimized version of our best-in-class CDR agent with 50% less resource consumption.</p></li></ul><p class="paragraph" style="text-align:left;">Watch this webinar now to see the new standard for cloud security for yourself.</p><h2 class="heading" style="text-align:center;"><b>👉 </b><a class="link" href="https://www.paloaltonetworks.com/engage/cortex-forward-webinar-series/meet-cortex-cloud-2-0?utm_source=tldrSEC&utm_medium=eNewsletter-Nov&utm_campaign=Cortex-Cloud&utm_content=Cortex-Forward-Episode-Meet-Cortex-Cloud2.0" target="_blank" rel="noopener noreferrer nofollow"><b>WATCH NOW</b></a><b> 👈</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Automatically investigating alerts, gathering context, and auto-fixing things where possible is going to be huge when done well. And 1.2B real-world responses is a pretty big dataset to train on 🤯 </p><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;">Cloud Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://aws.amazon.com/blogs/security/aws-reinvent-2025-your-guide-to-security-sessions-across-four-transformative-themes?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">AWS re:Invent 2025: Your guide to security sessions across four transformative themes</a><br>There will be &gt;80 security-focused sessions across four main themes: Securing and Leveraging AI, Architecting Security and Identity at Scale, Building a Culture of Security, and Innovations in AWS Security. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">The AI security sessions cover protecting AI workloads, securing agentic AI systems, and using AI for security operations, with workshops on red teaming generative AI applications and implementing authentication for AI agents.</p></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://sirantd.com/how-i-overlooked-the-problem-and-shot-myself-in-the-foot-06841414e1de?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">How I Overlooked the Problem and Shot Myself in the Foot</a><br>AWS consultant <a class="link" href="https://www.linkedin.com/in/dmytro-sirant?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Dmytro Sirant</a> on how he overlooked a critical issue during an IAM-to-SSO migration, where deleting an IAM user left a KMS key with an immutable policy that prevented further infrastructure changes. He discovered that Terraform would silently &quot;succeed&quot; when trying to update an EKS cluster&#39;s encryption key (which isn&#39;t actually possible), and had to go through AWS Support&#39;s specific recovery process, which involves creating specially-named IAM users for each affected key.</p><p class="paragraph" style="text-align:left;">Lesson: always update KMS key policies before deleting IAM users.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/righteousgambit/quiet-riot?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">righteousgambit/quiet-riot</a><br>By <a class="link" href="https://www.linkedin.com/in/wesleyladd?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Wes Ladd</a>: An enumeration tool for scalable, unauthenticated validation of AWS, Azure, and GCP principals; including AWS Acccount IDs, root e-mail addresses, users, and roles, Azure Active Directory Users, and Google Workspace Users/E-mails.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.plerion.com/blog/about-aws-service-linked-roles?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Things you wish you didn&#39;t need to know about AWS service-linked roles</a><br>Plerion’s <a class="link" href="https://www.linkedin.com/in/danielgrzelak?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Daniel Grzelak</a> explores the peculiarities of AWS service-linked roles (SLRs), explaining how they differ from service roles (owned by AWS, not you, can’t be edited, and more), their security implications, and potential issues with their implementation.</p><p class="paragraph" style="text-align:left;">The post shows how SLRs can be used to enumerate services in any AWS account, bypassing permission restrictions to discover resources, some have loosely scoped policies, and they may potentially create security issues through dubious SLR policy practices like using non-reserved tags (not prefixed with <code>aws:</code>), name-based policies, and policies that may allow privilege escalation.</p><p class="paragraph" style="text-align:left;"></p><div id="blue-team" class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Blue Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/R3DRUN3/magnet?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">R3DRUN3/magnet</a><br>By <a class="link" href="https://www.linkedin.com/in/simone-ragonesi-275567222/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Simone Ragonesi</a>: A purple-team telemetry & simulation toolkit designed to generate both telemetry and malicious activity for testing detection capabilities and SOC analyst responses. Magnet includes simulation modules mapped to MITRE ATT&CK, like ransomware (which generates and encrypts thousands of files, attempts to delete shadow copies, and places ransom notes), discovery simulation, and high CPU miner simulation, while writing detailed activity logs in various formats to help security teams validate their detection rules and behavioral analytics.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://medium.com/@BlakeHensleyy/automation-for-threat-detection-quality-assurance-4a7d9acbcc4e?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Automation for Threat Detection Quality Assurance</a><br><a class="link" href="https://www.linkedin.com/in/blake-hensley1?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Blake Hensley</a> outlines various types of automated tests to verify threat detection rules before deployment, including: foundational checks (schema validation, query syntax validation, source health monitoring, pipeline integrity checks), a simple backtest (running a query backwards in time over historical data to determine if there are too many results), execution efficiency (performance metrics like query time), dynamic backtests, comparing the original query results to the new query, using an LLM-as-judge, unit tests (known pass/fail cases), and validating the detection logic works from purple team activity in a lab environment.</p><p class="paragraph" style="text-align:left;">See also Blake’s example GitHub implementation (<a class="link" href="https://github.com/BlakeHensleyy/kql-tester?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">kql-tester</a>) that applies the first four tests to KQL in Azure Sentinel analytic rules.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.recordedfuture.com/blog/threat-hunting-vs-threat-intelligence?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Threat Hunting vs. Threat Intelligence</a><br>Recorded Future’s <a class="link" href="https://www.linkedin.com/in/madelynmaletz/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Maddy Maletz</a> explains how threat intelligence (understanding external threats, their motives, and TTPs) and threat hunting (proactively searching for threats already inside systems) work together to create a more effective security strategy. Threat intelligence guides hunting hypotheses and provides context for suspicious findings, while threat hunting validates intelligence and discovers what automated defenses miss.</p><p class="paragraph" style="text-align:left;">💡 I thought this was a nice high level overview, and I like the comparison table.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2e3060b2-6701-4569-9bbe-8385a54aad4b/threat_intel_vs_threat_hunting.png?t=1763601173"/></div></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Red Team</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/winsecurity/MaleficentVM?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">winsecurity/MaleficentVM</a><br>A practice VM for malware development. It contains practice challenges for malware development just like CTF challenges, including: enumerate the OS version or service configuration, inject shellcode into a target process, use IAT hooking to hook a specific function, etc.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/EvilBytecode/GoDefender?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">EvilBytecode/GoDefender</a><br>A powerful Go-based security toolkit designed to detect and defend against debugging, virtualization, and DLL injection attacks. GoDefender provides multiple protection mechanisms to make reverse engineering and analysis significantly more difficult, including virtualization detection (VMware, VirtualBox, KVM, QEMU, Parallels), anti-debugging techniques (API monitoring, critical function patching, process validation), and DLL injection prevention by leveraging Binary Image Signature Mitigation Policy to block non-Microsoft binaries.</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://offsec.almond.consulting/evading-elastic-callstack-signatures.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Evading Elastic EDR&#39;s call stack signatures with call gadgets</a><br>Almond OffSec’s <a class="link" href="https://x.com/saerxcit?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">SAERXCIT</a> demonstrates a technique to evade Elastic EDR&#39;s call stack-based detection by inserting arbitrary modules into the call stack during module loading, allowing shellcode to load a network module without getting detected (<a class="link" href="https://github.com/AlmondOffSec/LibTPLoadLib?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">PoC</a>). </p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">AI + Security</h2><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Quicklinks</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/rowboatlabs/rowboat?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">rowboatlabs/rowboat</a> - AI-powered CLI for background agents.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://github.com/toon-format/toon?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">toon</a> - Token-Oriented Object Notation - Compact, human-readable, schema-aware JSON for LLM prompts.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://fly.io/blog/everyone-write-an-agent?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">You Should Write An Agent</a> - <a class="link" href="https://x.com/tqbf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Thomas Ptacek</a> argues that writing simple LLM agents is easy, and you should write one to really get it. You can build a simple one in 30min.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nudgesecurity.com/content/ai-discovery-methods-compared?utm_medium=sponsored&utm_source=tldr&utm_content=newsletter&utm_campaign=ai_security&utm_term=link_ai-discovery-pdf_251120" target="_blank" rel="noopener noreferrer nofollow">How to discover shadow AI [Free Guide]</a> - The first step in mitigating AI risks is to uncover where AI is being used across your SaaS ecosystem. Get a fast start with this guide.*</p><ul><li><p class="paragraph" style="text-align:left;">Also, congrats to Nudge for raising a <a class="link" href="https://www.nudgesecurity.com/press/nudge-security-raises-22-5m-series-a-to-secure-workforce-ai-and-saas?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">$22.5M Series A</a> 🥳 3x ARR growth for two consecutive years, 60 feature releases in the last 12 months.</p></li></ul></li><li><p class="paragraph" style="text-align:left;">Paper - <a class="link" href="https://arxiv.org/abs/2511.09030?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Solving a Million-Step LLM Task with Zero Errors</a></p></li></ul><p class="paragraph" style="text-align:left;"><sup>*Sponsored</sup></p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.google/technology/ai/google-private-ai-compute?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Private AI Compute: our next step in building private and helpful AI</a><br>Google’s <a class="link" href="https://www.linkedin.com/in/jay-yagnik-3727776/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Jay Yagnik</a> announces Private AI Compute, a new cloud-based AI system designed to deliver AI capabilities while maintaining user data privacy. Private AI Compute runs on one Google stack powered by their custom Tensor Processing Units (TPUs) and <a class="link" href="https://cloud.google.com/blog/products/compute/titanium-underpins-googles-workload-optimized-infrastructure?e=48754805&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Titanium</a> Intelligence Enclaves (TIE). Remote attestation and encryption are used to connect your device to the hardware-secured sealed cloud environment, allowing Gemini models to securely process your data within a specialized, protected space that not even Google can access.</p><p class="paragraph" style="text-align:left;">💡 Apple previously announced their <a class="link" href="https://security.apple.com/blog/private-cloud-compute/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Private Cloud Compute</a>, so it makes sense that Google would get into the same game. I wonder if OpenAI or Anthropic will too 🤔 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nccgroup.com/research-blog/public-report-google-private-ai-compute-review?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Public Report: Google Private AI Compute Review</a><br><a class="link" href="https://www.linkedin.com/company/ncc-group?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">NCC Group</a> shares their public report on Google’s Private AI Compute cloud system. The assessment included architecture review, cryptographic assessment of the attestation/encryption implementations, security analysis of IP-blinding relay, source code review, and more. Ten consultants, 100 person-days.</p><p class="paragraph" style="text-align:left;">💡 Beyond just the findings, the system architecture overview, system components, and general discussion of how things work is neat. Also shout-out to my former NCC colleagues 🙌 </p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.anthropic.com/news/disrupting-AI-espionage?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Disrupting the first reported AI-orchestrated cyber espionage campaign</a><br><a class="link" href="https://www.linkedin.com/company/anthropicresearch?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Anthropic</a> describes a campaign by a Chinese state-sponsored group used Claude Code as an autonomous agent to target 30 global organizations, successfully infiltrating a small number. The attackers jailbroke Claude by breaking tasks into seemingly innocent components, convincing it it was performing legitimate security testing, then had it autonomously perform reconnaissance, vulnerability discovery, exploit development, lateral movement, credential harvesting, and data exfiltration with minimal human intervention. <a class="link" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Full Report</a>.</p><p class="paragraph" style="text-align:left;">“The threat actor was able to use AI to perform 80-90% of the campaign, with human intervention required only sporadically (perhaps 4-6 critical decision points per hacking campaign).”</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d23a4d30-fa68-49ea-a775-154f69ed82bf/Screenshot_2025-11-18_at_8.40.01_PM.png?t=1763527246"/></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/89c0b90f-e8a7-4e96-a394-68f40a5bd111/image.png?t=1763527215"/></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Researchers question Anthropic claim that AI-assisted attack was 90% autonomous</a><br>Article by Ars Technica’s <a class="link" href="https://www.linkedin.com/in/dan-goodin-37b563311/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Dan Goodin</a> tying together a few security researchers questioning the Anthropic report’s claims, arguing that Claude regularly declines legit security researchers when asking it to perform cybersecurity tasks, so why would these threat actors get much better performance? And the report said that Claude “frequently overstated findings and occasionally fabricated data during autonomous operations, claiming to have obtained credentials that didn’t work or identifying critical discoveries that proved to be publicly available information.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/posts/chrisathompson_seeing-a-lot-of-bad-takes-on-anthropics-activity-7395894630170624000-vu6f?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Capabilities of Lower Sophistication Actors Will Increase</a><br>LinkedIn post by <a class="link" href="https://www.linkedin.com/in/chrisathompson/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Chris Thompson</a>, founder of Offensive AI Con: “A lot of people are missing the point; offensive cyber capabilities in current models are a side-effect of being trained on coding datasets. As frontier model labs and private groups start to shift to tuning current models and training purpose-built cyber models on refined offensive datasets, the effectiveness of open and closed models will increase significantly, enabling stealth & evasion focused offensive cyber operations and advanced ransomware attacks.”</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7d073b56-0b9d-4d45-bb0d-b3412740bfea/image.png?t=1763527783"/></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/ai-orchestrated-cyberattacks.html?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">The dawn of AI-orchestrated cyberattacks: A call to action for cyber defense</a><br>PwC’s <a class="link" href="https://www.linkedin.com/in/morgan-adamski-501094240/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Morgan Adamski</a> (former NSA Director and U.S. Cyber Command Executive Director) and <a class="link" href="https://www.linkedin.com/in/david-ames-5717984/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">David Ames</a> and former NSA Director <a class="link" href="https://www.linkedin.com/in/rob-joyce-b43445116/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Rob Joyce</a> weigh in on the Anthropic report. “<b>Cost asymmetry: </b>The operation showed that attackers can add more compute/data/test time to model exploits and get immediate, scaled impact, while defenders are working linearly (focusing on adding headcount, dealing with fragmented tools, etc.).”</p><p class="paragraph" style="text-align:left;">From <a class="link" href="https://www.linkedin.com/posts/rob-joyce-b43445116_the-dawn-of-ai-orchestrated-cyberattacks-activity-7395275152613347329-ldyQ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Rob Joyce on LinkedIn</a>: “I’ve been following offensive AI developments with great interest over the last year. I don’t think defenders yet appreciate how rigorously capable Agentic AI will test their attack surface. Some remain dismissive of today’s AI-driven hacking capabilities, but they’re not accounting for the exponential rate of improvement.”</p><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.promptfoo.dev/blog/claude-code-attack?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">How to replicate the Claude Code attack with Promptfoo</a><br><a class="link" href="https://www.linkedin.com/in/ianww/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Ian Webster</a> walks through using Promptfoo to jailbreak Claude Code to perform tasks including creating and installing a keylogger and reverse shell, enumerating and exfiltrating SSH private keys and API keys, etc.</p><p class="paragraph" style="text-align:left;">After running 332 adversarial scenarios, they found that many agents lose track of their safety training 15 turns into a conversation about &quot;Blue Team playbooks.&quot;</p><p class="paragraph" style="text-align:left;">💡 I found the discussion of attack strategies interesting, like the “meta” prompting strategy that is effectively an agent reasoning loop on the attacker&#39;s side that attempts a jailbreak, looks at why the jailbreak didn&#39;t work, and then intelligently modifies it to try again, and “hydra”, which uses multi-turn conversations to gradually escalate and can backtrack and reset the agent&#39;s state each time it hits a refusal.</p><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">Misc</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">AI</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://blog.google/products/gemini/gemini-3/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Gemini 3</a> - Wake up bae, new model dropped! They launched their own VS Code-fork (Google Antigravity) that has built-in browser use, nano banana to generate mocks, screen recordings to prove features were implemented, give visual comments on a specific element like a designer would, and more. Looks pretty rad.</p></li><li><p class="paragraph" style="text-align:left;">FT - <a class="link" href="https://www.ft.com/content/064bbca0-1cb2-45ab-85f4-25fdfc318d89?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Oracle is already underwater on its ‘astonishing’ $300bn OpenAI deal</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bbc.com/news/articles/cwy7vrd8k4eo?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Google’s Sundar Pichai says trillion-dollar AI investment boom has &#39;elements of irrationality&#39;</a> </p></li><li><p class="paragraph" style="text-align:left;">Cheeky Pint - <a class="link" href="https://www.youtube.com/watch?v=L2OPYYthw4c&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Satya Nadella describes how lessons from Microsoft’s history apply to today’s boom</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Misc</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/adamwathan/status/1944496101869916502?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Adam Wathan</a> - What have you bought that’s made something in your life a million times easier that most people don’t seem to know about?</p></li><li><p class="paragraph" style="text-align:left;">Dickie Bush - <a class="link" href="https://www.youtube.com/watch?v=tHuJYsBZzcc&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">The Goal-Achieving Hack I Wish I Knew Earlier</a> - It’s all about solving the core constraint, and then doing more/better.</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/otis_reid/status/1985482354186731876?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Coca Cola has an executive who is solely in charge of their relationship with McDonalds</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://untranslatable.co/entries?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Untranslatable</a> - Various idioms in different languages and cultures and what they mean. Fascinating!</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://berkshirehathaway.com/news/nov1025.pdf?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Warren Buffet’s final shareholder letter</a> - “Decide what you would like your obituary to say and live the life to deserve it… Greatness does not come about through accumulating great amounts of money, great amounts of publicity or great power in government. When you help someone in any of thousands of ways, you help the world. Kindness is costless but also priceless.”</p></li><li><p class="paragraph" style="text-align:left;">Daniel Priestley - <a class="link" href="https://www.youtube.com/watch?v=cOBCjNXl4LE&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Oversubscribed - Summarized by the Author</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/shorts/SP8mjkVU4wQ?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Kid magician doing three-card Monte on Penn & Teller</a></p></li></ul><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;">Music</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.instagram.com/reel/DQsEXSXj-m5/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">That time a choir kid used a helium balloon to hit an insanely high note</a> 😂 </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=fucFmhYm7is&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Charlie Puth Mixes Jimmy’s Raw Vocals to Create a Song on the Spot</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=FxEX_GWwE7M&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">How EJAE and Mark Sonnenblick Created &quot;Golden&quot; From KPop Demon Hunters</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.youtube.com/watch?v=D9lY5SsQqFQ&utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">Why Phil Collins&#39; GENIUS Songs In Tarzan Are Even Crazier Than You Thought</a> - Very fun breakdown of “Strangers Like Me.” I remember loving the Tarzan soundtrack when it first came out, and my dad was a big fan of Phil Collins, so we’d listen to it together sometimes. I wish he was around to hear this melodic breakdown, I think he’d really like it.</p></li></ul><p class="paragraph" style="text-align:left;"></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;">✉️ Wrapping Up</h2><hr class="content_break"><p class="paragraph" style="text-align:left;">Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.</p><p class="paragraph" style="text-align:left;">If you find this newsletter useful and know other people who would too, I&#39;d really appreciate if you&#39;d forward it to them 🙏</p><p class="paragraph" style="text-align:left;">Thanks for reading!</p><p class="paragraph" style="text-align:left;">Cheers,<br>Clint</p><p class="paragraph" style="text-align:left;">P.S. Feel free to connect with me on <a class="link" href="https://www.linkedin.com/in/clintgibler/?utm_source=tldrsec.com&utm_medium=newsletter&utm_campaign=tl-dr-sec-306-claude-code-s-hacking-campaign-rust-in-android-secrets-scanners-miss" target="_blank" rel="noopener noreferrer nofollow">LinkedIn</a> 👋 </p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=5b56d089-fa8f-4a5c-9740-3c0ae3678fb2&utm_medium=post_rss&utm_source=tl_dr_sec">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
