Product
Exercises
Blog
Contact
Contact Us
Contact Us
Blog
Chaos Engineering and General Mischief
Understanding How Controlled Disruptions Can Enhance Security Measures
View all
Category
5 min read
Hacking AI Applications: From 3D Printing to Remote Code Execution
The blog post examines methods for hacking AI-native applications by detailing vulnerabilities discovered while building KachraCraft, a 3D design generation tool, including techniques for revealing system prompts, executing server-side request forgery (SSRF), and novel ways to exfiltrate data through AI-generated artifacts like STL files.
Read more
Category
5 min read
Stop Using Predictable Bucket Names: A Failed Attempt at Hacking Satellites
This blog discusses the security risks of S3 bucket namesquatting in AWS, where attackers could potentially exploit predictable bucket naming patterns that include region names, and documents the author's research finding buckets pre-created for non-existent regions (up to "us-east-15") while searching for potential vulnerabilities in AWS service-managed buckets.
Read more
Category
5 min read
Beyond RCE: Autonomous Code Execution in Agentic AI
This blog post explores how agentic AI systems, specifically the "Computer Use" feature, can be manipulated through prompt injections and phishing techniques to execute arbitrary commands.
Read more
Category
5 min read
Turning AWS Documentation into Gold: AI-Assisted Security Research
In this article we went over how to use embeddings in AWS Bedrock, scraping AWS documentation, leveraging ripgrep for fast searches on local disk, and some interesting security research along the way.
Read more
Category
5 min read
Exposing Security Observability Gaps in AWS Native Security Tooling
Explore the limitations and effectiveness of AWS IAM Access Analyzer in detecting publicly exposed resources across various AWS services. Learn about common misconceptions, deployment tips, and critical observability gaps in AWS native security tooling.
Read more