A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets. The attacker, an autonomous bot called hackerbot-claw, used 5 different exploitation techniques and successfully exfiltrated a GitHub token with write permissions from one of the most popular repositories on GitHub. This post breaks down each attack, shows the evidence, and explains what you can do to protect your workflows.
https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation#attack-6-aquasecuritytrivy---evidence-cleared
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
The "Reach" pattern is a personal CLI that hijacks existing browser sessions to query SaaS APIs (Slack, Jira, Confluence, etc.) on your behalf, feeding structured organizational context to your AI coding assistant.
https://jackdanger.com/the-reach-pattern
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
A technical deep-dive into Praetorian's multi-agent CVE research pipeline, exploring how orchestrated AI agents transform vulnerability data into validated detection templates.
https://www.praetorian.com/blog/how-ai-agents-automate-cve-vulnerability-research/
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2❤1👍1
🔶 Bucketsquatting is (Finally) Dead
AWS introduced account-regional namespaces for S3 (<prefix> - <accountid> - <region> - an) to eliminate bucketsquatting, where attackers claim deleted bucket names.
https://onecloudplease.com/blog/bucketsquatting-is-finally-dead
#aws
AWS introduced account-regional namespaces for S3 (<prefix> - <accountid> - <region> - an) to eliminate bucketsquatting, where attackers claim deleted bucket names.
https://onecloudplease.com/blog/bucketsquatting-is-finally-dead
#aws
❤1👍1🔥1
🔶 Behind the console: Active phishing campaign targeting AWS console credentials
Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure.
https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign
#aws
Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure.
https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign
#aws
❤1👍1🔥1
🔶 Introducing account regional namespaces for Amazon S3 general purpose bucket
AWS launches a new feature of Amazon S3 that lets you create general purpose buckets in your own account regional namespace simplifying bucket creation and management as your data storage needs grow in size and scope.
https://aws.amazon.com/ru/blogs/aws/introducing-account-regional-namespaces-for-amazon-s3-general-purpose-buckets
#aws
AWS launches a new feature of Amazon S3 that lets you create general purpose buckets in your own account regional namespace simplifying bucket creation and management as your data storage needs grow in size and scope.
https://aws.amazon.com/ru/blogs/aws/introducing-account-regional-namespaces-for-amazon-s3-general-purpose-buckets
#aws
❤1👍1🔥1
🤖 When an AI agent came knocking: Catching malicious contributions in Datadog’s open source repos
How Datadog discovered malicious issues and PRs in two of their public repositories as the result of attacks by hackerbot-claw, an AI agent designed to target GitHub Actions and LLM-powered workflows.
https://www.datadoghq.com/blog/engineering/stopping-hackerbot-claw-with-bewaire
#AI
How Datadog discovered malicious issues and PRs in two of their public repositories as the result of attacks by hackerbot-claw, an AI agent designed to target GitHub Actions and LLM-powered workflows.
https://www.datadoghq.com/blog/engineering/stopping-hackerbot-claw-with-bewaire
#AI
❤1👍1🔥1
⚙ trajan
A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations. You can also check out the companion blog post.
https://github.com/praetorian-inc/trajan
#cicd
A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations. You can also check out the companion blog post.
https://github.com/praetorian-inc/trajan
#cicd
👍3🔥2❤1
🔶 Pentesting a pentest agent - Here's what I've found in AWS Security Agent
A researcher pentested AWS Security Agent, finding 4 issues: DNS confusion enabling unauthorized domain pentesting, a full reverse shell/container escape chain to host root + AWS credentials via prompt injection, unnecessary destructive actions (e.g., DROP TABLE probes, exploit-based cleanup deleting /etc/crontab), and unredacted secrets in pentest reports.
https://blog.richardfan.xyz/2026/03/14/pentesting-a-pentest-agent-heres-what-ive-found-in-aws-security-agent.html
#aws
A researcher pentested AWS Security Agent, finding 4 issues: DNS confusion enabling unauthorized domain pentesting, a full reverse shell/container escape chain to host root + AWS credentials via prompt injection, unnecessary destructive actions (e.g., DROP TABLE probes, exploit-based cleanup deleting /etc/crontab), and unredacted secrets in pentest reports.
https://blog.richardfan.xyz/2026/03/14/pentesting-a-pentest-agent-heres-what-ive-found-in-aws-security-agent.html
#aws
🔥2❤1👍1
🔶 Pwning AI Code Interpreters in AWS Bedrock AgentCore
Phantom Labs discovered that AWS Bedrock AgentCore Code Interpreter's sandbox mode allows DNS queries, enabling bypass of network isolation through DNS-based command-and-control. This research details the discovery, proof-of-concept exploit, disclosure timeline, and defensive guidance for organizations using Code Interpreter workloads.
https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter
#aws
Phantom Labs discovered that AWS Bedrock AgentCore Code Interpreter's sandbox mode allows DNS queries, enabling bypass of network isolation through DNS-based command-and-control. This research details the discovery, proof-of-concept exploit, disclosure timeline, and defensive guidance for organizations using Code Interpreter workloads.
https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter
#aws
❤1👍1🔥1
🤖 Securing our codebase with autonomous agents
Cursor's security team built a fleet of security agents to find and fix vulnerabilities across a fast-changing codebase.
https://cursor.com/blog/security-agents
#AI
Cursor's security team built a fleet of security agents to find and fix vulnerabilities across a fast-changing codebase.
https://cursor.com/blog/security-agents
#AI
👍2❤1🔥1
OpenSandbox is a general-purpose sandbox platform for AI applications, offering multi-language SDKs, unified sandbox APIs, and Docker/Kubernetes runtimes for scenarios like Coding Agents, GUI Agents, Agent Evaluation, AI Code Execution, and RL Training.
https://github.com/alibaba/OpenSandbox
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
🔶 Cracks in the Bedrock: Bypassing SCP Enforcement with Long-Lived API Keys
Sonrai Security researcher discovered that AWS "bedrock-mantle" IAM permissions could bypass SCP enforcement when using long-lived Service Specific Credential API keys. IAM policy denials worked correctly, but SCP denials were bypassed. AWS patched this between Jan–Feb 2026; no customer action required.
https://sonraisecurity.com/blog/cracks-in-the-bedrock
#aws
Sonrai Security researcher discovered that AWS "bedrock-mantle" IAM permissions could bypass SCP enforcement when using long-lived Service Specific Credential API keys. IAM policy denials worked correctly, but SCP denials were bypassed. AWS patched this between Jan–Feb 2026; no customer action required.
https://sonraisecurity.com/blog/cracks-in-the-bedrock
#aws
❤1👍1🔥1
🔶 Simulating Ransomware with AWS KMS
Post that demonstrates how attackers can abuse AWS KMS by importing malicious key material to encrypt RDS/EBS resources, then deleting the material to make data inaccessible without ransom payment.
https://heilancoos.github.io/research/2025/09/02/aws-kms-ransomware.html
#aws
Post that demonstrates how attackers can abuse AWS KMS by importing malicious key material to encrypt RDS/EBS resources, then deleting the material to make data inaccessible without ransom payment.
https://heilancoos.github.io/research/2025/09/02/aws-kms-ransomware.html
#aws
❤1👍1🔥1
🔶 Locking down AWS principal tags with RCPs and SCPs
A post explaining how to use SCPs to restrict sensitive IAM actions to tagged principals, RCPs to block unauthorized "scp-*" session tags from external/non-tagger principals, and SCPs to protect the "tagger" role itself via CloudFormation StackSets.
https://awsteele.com/blog/2026/02/21/locking-down-aws-principal-tags-with-rcps-and-scps.html
#aws
A post explaining how to use SCPs to restrict sensitive IAM actions to tagged principals, RCPs to block unauthorized "scp-*" session tags from external/non-tagger principals, and SCPs to protect the "tagger" role itself via CloudFormation StackSets.
https://awsteele.com/blog/2026/02/21/locking-down-aws-principal-tags-with-rcps-and-scps.html
#aws
❤1👍1🔥1
🔴 Remote Command Execution in Google Cloud with Single Directory Deletion - GMO Flatt Security Research
A race condition in Google Cloud Looker's directory deletion API allows deleting the ".git" directory while concurrent Git operations proceed, causing Git to use attacker-controlled worktree configs for RCE. Kubernetes service account misconfigurations further enabled cross-instance privilege escalation.
https://flatt.tech/research/posts/remote-command-execution-in-google-cloud-with-single-directory-deletion
#gcp
A race condition in Google Cloud Looker's directory deletion API allows deleting the ".git" directory while concurrent Git operations proceed, causing Git to use attacker-controlled worktree configs for RCE. Kubernetes service account misconfigurations further enabled cross-instance privilege escalation.
https://flatt.tech/research/posts/remote-command-execution-in-google-cloud-with-single-directory-deletion
#gcp
❤1👍1🔥1
A large-scale phishing campaign is targeting developers directly inside GitHub, using fake Visual Studio Code security alerts posted through Discussions to trick users into installing malicious software.
https://socket.dev/blog/widespread-github-campaign-uses-fake-vs-code-security-alerts-to-deliver-malware
#github
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
Railway PaaS is being weaponized as a clean token replay engine in an active AiTM and device code phishing campaign impacting 268+ M365 organizations and 100+ MSPs.
https://www.huntress.com/blog/railway-paas-m365-token-replay-campaign
#PaaS
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1