Access it here:
π notebooklm.google.com/notebook/78e...
Thank you Rob and team for stepping up, and helping make the conference what it becam
@gadievron.bsky.social
CEO & Co-Founder at Knostic, CISO-in-Residence for AI at Cloud Security Alliance. Former Founder @Cymmetria (acquired). Host at Prompt||GTFO. Threat hunter, scifi geek, dance teacher. Opinions my own.
Access it here:
π notebooklm.google.com/notebook/78e...
Thank you Rob and team for stepping up, and helping make the conference what it becam
It was diligently executed on by Julie Michelle Morris, who sat through endless sessions to make it happen. And, empowered by Emanuel Gawrieh and Dragos Ruiu, who immediately jumped in without a second thought, and helped set up the system.
06.03.2026 10:35 β π 0 π 0 π¬ 1 π 0
And yes, as itβs NotebookLM you can always use it to generate a podcast - on any topic π
This is the brainchild of the brilliant Rob T. Lee (which you shouldnβt be surprised about when it comes to Rob). All I had to do was get out of the way.
And there is no reason for a conference to end when you walk out the door. We can engage with the content and attendees beyond transcripts, summaries, and Slack.
We live in the future.
For both conference days, every talk with full transcripts and slides was loaded into a NotebookLM, and [un]prompted became more than just a hybrid online/physical con, with this one of many examples of what an AI-native conference could look like.
06.03.2026 10:35 β π 0 π 0 π¬ 1 π 0Would you like to chat with [un]prompted con about AI security? Follow a thread across every session, brief your team, or just base your research on the knowledge collected?
06.03.2026 10:35 β π 1 π 1 π¬ 1 π 0Hahaha
05.03.2026 19:57 β π 1 π 0 π¬ 0 π 0βIβm in this tweet and I donβt like it.β
05.03.2026 19:56 β π 1 π 0 π¬ 0 π 0
And do thank a volunteer when you see them, these are CISOs, researchers, a billionaire or three, a professor, someoneβs SO, and all around awesome people who spend their con just helping out.
See you soon!
Vibe code together.
Feel the wonder of being alive in 2026β¦ and Iβll just get off my soap box again.
Logistics:
- Show up at 8:30 am.
- This evening is free-form. Suggest food locations for dinner on Slack, around 4 pm, and gather a group of old and new friends for the experience.
Use the baseball cards to find people relevant to what you do, who can help you, and whom you can help.
Talk about presentations on Slack with physical and online attendees, and make fun of Dragos Ruiu as he debugs the magic of the crazy online setup and forgets to turn off his mic.
The talks are solid, but this con is about community, and relationships. There is something new happening here, and watching CISOs, researchers, and threat hunters mingle and talk context windows is a special thing to behold, indeed.
04.03.2026 13:58 β π 0 π 0 π¬ 1 π 0Pic: [un]prompted meme of the day, looking cool and collected, but paddling like crazy under the surface.
04.03.2026 13:58 β π 0 π 0 π¬ 1 π 0
Toward day 2 at [un]prompted, prepare yourself to.. deal with people. Iβd prefer dogs, too, but yβknow what? These folks arenβt half bad!
A short thread
Gadi Evron addressing the Unprompted conference
Kudos to @gadievron.bsky.social and the Unprompted team for setting up an amazing event that happens at exactly the right time. Check out the livestream (unpromptedcon.org)
03.03.2026 17:18 β π 2 π 1 π¬ 0 π 0
I like reading Kevin Beaumont. Heβs fun.
He wrote on this better than I would have, so Iβll let the screenshot speak for itself. Canβt tag him on LinkedIn though. π
β
And if you care to secure coding agents and what they do, check out what we do at Knostic!
knostic.ai
And if you're looking to defend your agents and coding assistants, not to mention preventing them from deleting your computer or code, do check Knostic out, or just message me for a demo.
knostic.ai
Links:
- Project page: openant.knostic.ai
- For technical details, limitations, and token costs, check out this blog post: knostic.ai/blog/openant
- To submit your repo for scanning: knostic.ai/blog/oss-scan
- Repo: github.com/knostic/Open...
You can just download OpenAnt, but:
- Want it managed? If you'd like us to manage it for you, plug-and-play it into your CI/CD, leave us a note on the project page to get on the waiting list. - Scan your open source! Submit the form on the project page for us to scan your repo.
Why OpenAnt is Different:
- A "unit" in OpenAnt is some coe block (e.g., function, module, etc.) along with additional metadata that allows the LLM to analyze it with the proper context.
- Adversarial reflexion: Validating vulnerabilities with constrained personas
Since our focus is on protecting coding agents and preventing them from rm -rf your computer and deleting your code (not vulnerability research), we're releasing OpenAnt for free. Plus, we like open source.
..And besides, it makes zero sense to compete with Anthropic and OpenAI.
@knosticai is open-sourcing OpenAnt, our LLM-based vulnerability discovery product, similar to Anthropic's Claude Code Security, but free. It helps defenders proactively find verified security flaws. Stage 1 detects. Stage 2 attacks. What survives is real.
Why open source?
We lost FX. A lot of people wrote about this so I feel comfortable sharing here too. Iβm heartbroken. Weβre heartbroken.
At 8 am pacific today (Monday), we are gathering on Zoom to share memories of FX, as a community. Ping me for a link.
First they didnβt believe AI can code. Then they didnβt believe AI can find and exploit vulnerabilities and replaces most of AppSec. Now they donβt believe AI will replace most of the SOC. Letβs talk again in a few months and see what people wonβt want to believe then.
27.02.2026 22:26 β π 0 π 0 π¬ 0 π 0
And, as usual, if you want to secure your own agents/MCP/skills/etc. and get ahead of AI risks, check out what we do at Knostic, and hit me up for a demo.
knostic.ai
I understand how overwhelming things can feel, and how difficult creating change in companies can beβ¦
All it takes is trying, and understanding English. Try now. Get an agent. Talk to it.
Iβd like to highlight leaders in AppSec who break the trend of poor communications, because they were already ahead of the curve, before being blindsided by Anthropic:
@weld.bsky.social of Veracode, Isaac Evans of Semgrep, and Neatsun Ziv of OX Security.
Each point is an arbitrary percentage additive to an assumed readiness to shift with the times - a shot at survival, a shot at staying relevant.
27.02.2026 02:32 β π 0 π 0 π¬ 1 π 0Itβs about culture and moving fast, not market research, and I believe this applies to a huge bank as much as it does to a small vendor or even your own security team.
27.02.2026 02:32 β π 0 π 0 π¬ 1 π 0