Allan's Avatar

Allan

@allanfriedman.bsky.social

SBOM Champion. Full service technocrat. Now at @CISAgov, formerly NTIA. Lapsed{engineer, academic, author}. Personal Account. Food, drink, dogs, SBOM

3,449 Followers  |  757 Following  |  542 Posts  |  Joined: 10.05.2023
Posts Following

Posts by Allan (@allanfriedman.bsky.social)

That’s great! Congrats. Would love to catch up sometime soon. We need to have you over for dinner for a quieter party.

08.03.2026 20:34 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

@cillic.bsky.social - we were apparently the only people to ever order this voluntarily, and we killed the bottle.

08.03.2026 03:30 β€” πŸ‘ 17    πŸ” 0    πŸ’¬ 6    πŸ“Œ 0
Preview
Intro to HDMoore’s Law Most people understand β€œMoore’s Law”: Compute power grows at the rate of doubling about every 2 years At Metricon6, I asserted β€œHDMoore’s Law” version 1: Casual …

blog.cognitivedissidents.com/2011/11/01/i...

07.03.2026 15:17 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

Very much reminds me of @joshcorman.bsky.social's idea of "HD Moore's Law" @hdm.io. Cybersecurity has come far in 15 (!) years--think of how normalized CVD is--but not nearly far enough. And the above piece neatly frames that this isn't an infosec problem, it's a cross-sector ecosystem problem.

07.03.2026 15:08 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Zero Day Clock The gap between disclosure and exploitation is collapsing to zero.

Impressed by the new zerodayclock.com effort/collective/call highlighting that the window between vuln and exploit now must be assumed as t=0.

The call to action is solid, though sadly nothing terribly new. Secure by design, adapt policies and practices. Liability, eridacate classes of vulns.

07.03.2026 14:59 β€” πŸ‘ 13    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Post image 03.03.2026 01:31 β€” πŸ‘ 19    πŸ” 2    πŸ’¬ 4    πŸ“Œ 0

The thing about the Taliban is that it's probably best understood as a Pashtun ethnic movement rather than a religious one. The Afghanistan-Pakistan border divides the Pashtun tribal lands almost exactly in half, leaving Pashtuns as ethnic minorities in both Afghanistan and Pakistan.

27.02.2026 16:30 β€” πŸ‘ 83    πŸ” 16    πŸ’¬ 4    πŸ“Œ 1

I’ve always felt that the pizza index was one of the more BS-laden OSINT stories. Google only measures in-person activity, and the pentagon fast food places have surge capability by design.

24.02.2026 16:32 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0
Post image

I googled β€œWeather” and instead of the weather widget, Google gave me an AI summary of a week old weather report from an unknown location in Alabama.

24.02.2026 06:49 β€” πŸ‘ 256    πŸ” 34    πŸ’¬ 16    πŸ“Œ 5
Preview
Volunteer Interest for BSides Edmonton 2026 Please fill this out if you are interested in volunteering for BSides Edmonton 2026! This form expresses your interest, and does not automatically make you an volunteer or organizer. We strongly rec...

BSides Edmonton needs some volunteer organizing staff, specifically a CTF co-lead is that you? is that someone you know? docs.google.com/forms/d/e/1F...

23.02.2026 16:18 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

It baffles my mind. Doctors don’t support bad doctors. Lawyers are disbarred. Teaching philosophies differ, but no one lines up behind abusive teachers. All major LE voices had to do was draw clear lines and say β€œthis is not how we protect communities” and 80% of Americans would have backed them.

22.02.2026 23:07 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

HUGE NEWS! πŸ“£

The "father of SBOM," @allanfriedman.bsky.social, is joining Anchore as a Board Advisor!

We sat down with him to discuss the future of #SoftwareSupplyChainSecurity and what comes after SBOM.... https://anchore.com/blog/anchore-welcomes-sbom-pioneer-dr-allan-friedman-as-board-advisor/

22.02.2026 22:51 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Surround yourself with good people. Pay it forward. Hug your friends every chance you get. Purge toxic people from your life.

20.02.2026 19:34 β€” πŸ‘ 82    πŸ” 11    πŸ’¬ 5    πŸ“Œ 1
Preview
Critical Vulnerabilities in VS Code Extensions Threaten 128 Million Developer Environments Three critical vulnerabilities have been found in four popular Visual Studio Code extensions. These extensions have been downloaded over 128 million times. The vulnerabilities are identified as CVE-2025-65715, CVE-2025-65716, and CVE-2025-65717. The findings from the OX Security Research team, later confirmed on Cursor and Windsurf IDEs , expose a systemic blind spot in modern software supply chain security: the developer’s own machine. Integrated Development Environments (IDEs) are where developers store and interact with the most sensitive organizational assets, such as business logic, API keys, database configurations, environment variables, and customer data. Extensions that operate with broad system-level permissions represent an unguarded gateway to it all. According to OX Security, a single malicious or vulnerable extension is sufficient to enable lateral movement and compromise an entire organization. CVE ID Extension CVSS Score Downloads Vulnerability Affected Versions CVE-2025-65717 Live Server 9.1 72M+ Remote file exfiltration All versions CVE-2025-65715 Code Runner 7.8 37M+ Remote code execution All versions CVE-2025-65716 Markdown Preview Enhanced 8.8 8.5M+ JavaScript execution leading to local port scanning and data exfiltration All versions No CVE Issued Microsoft Live Preview β€” 11M+ One-click XSS to full IDE file exfiltration Fixed in v0.4.16+ Extensions operate like privileged administrative processes embedded inside the IDE. They can execute code, read and modify files, and communicate across the local network all without raising standard security alerts. CVE-2025-65717, rated 9.1 (Critical), allows attackers to remotely exfiltrate files from a developer’s machine through Live Server’s localhost functionality. CVE-2025-65716 in Markdown Preview Enhanced (CVSS 8.8) enables JavaScript execution that can scan local ports and exfiltrate data, while CVE-2025-65715 in Code Runner (CVSS 7.8) opens the door to remote code execution, a worst-case scenario for any development environment. Microsoft’s Live Preview extension contained an XSS vulnerability that enabled full IDE file exfiltration; it was quietly patched in v0.4.16 with no CVE issued and no public credit given to OX Security. OX Security responsibly disclosed all three vulnerabilities to the respective maintainers in July and August 2025 through email, GitHub, and social channels. As of the publication of this article, none of the maintainers have responded to a failure that highlights the absence of any enforceable accountability framework for extension security in popular IDE marketplaces, OX Security added. Security teams and developers should treat IDE extensions with the same scrutiny applied to third-party software dependencies. Organizations are advised to audit installed extensions immediately and remove those that are non-essential. Localhost servers should not be left running unnecessarily, and developers should avoid opening untrusted HTML files while any localhost server is active. Configurations such as settings.json should never be modified using snippets sourced from emails, chats, or unverified repositories. At the platform level, OX Security calls for mandatory security reviews before extensions reach marketplaces, AI-powered automated scanning of new submissions, and enforceable patch response timelines for maintainers of high-download extensions. With AI coding assistants driving rapid increases in extension reliance, the current β€œinstall at your own risk” model presents an unacceptable and growing organizational risk. Follow us on Google News , LinkedIn , and X for daily cybersecurity updates. Contact us to feature your stories. The post Critical Vulnerabilities in VS Code Extensions Threaten 128 Million Developer Environments appeared first on Cyber Security News .

Critical Vulnerabilities in VS Code Extensions Threaten 128 Million Developer Environments

20.02.2026 12:05 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

When everyone talked about quitting tech and becoming farmers that was not what we meant

19.02.2026 21:30 β€” πŸ‘ 387    πŸ” 84    πŸ’¬ 9    πŸ“Œ 0

Table next to me at the coffee shop are senior firefighter policy folks talking about CERTs (community emergency response teams) and the language is similar enough to infosec that my ears won't stop firing cyber interrupts into my conscious brain.

19.02.2026 19:54 β€” πŸ‘ 8    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I am notoriously bad at predictions (curse of the expert, etc.) but I am going to say with some confidence that the pattern in all computing hardware is that companies expand to meet the current level of demand and, inevitably, there's a crash and overcapacity

17.02.2026 21:14 β€” πŸ‘ 70    πŸ” 13    πŸ’¬ 11    πŸ“Œ 1
Screenshot from ArsTechnica article where we learn that our colleagues formally from CoalFire who were arrested on a legit pen test are finally over their ordeal with the conclusion of the civil matter

Screenshot from ArsTechnica article where we learn that our colleagues formally from CoalFire who were arrested on a legit pen test are finally over their ordeal with the conclusion of the civil matter

Hell yes!Β Β Many of us have been following this story from the beginning, and I'm SO glad to see it resolved finally...

arstechnica.com/security/202...

29.01.2026 20:49 β€” πŸ‘ 445    πŸ” 88    πŸ’¬ 18    πŸ“Œ 9
Post image Post image Post image

With Trump admin scrapping requirement for software vendors to attest to their products' security, agencies must now decide how (or even whether) to require those assurances. My new story looks at what that could mean for software security in govt & beyond: www.cybersecuritydive.com/news/white-h...

28.01.2026 22:19 β€” πŸ‘ 13    πŸ” 5    πŸ’¬ 1    πŸ“Œ 1
Citizen Insights

People of DC: This is a great, frequently updated, zoomable map of where the snow plows are, and how recently they've been on any given street.

Based on our experience, it's accurate. We saw a truck, and then the map status of our street changed. Check it out

citizeninsights.geotab.com#/dcsnowgov

26.01.2026 16:26 β€” πŸ‘ 93    πŸ” 21    πŸ’¬ 5    πŸ“Œ 4

Love it!

25.01.2026 15:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

A gorgeous 2 mile walk across DC and the National Mall to make it to Day 2 of @districtcon.bsky.social and the entertaining keynote by Daniel Ridge.

Feels pretty special… β€œhackers now a-bed Shall think themselves accursed they were not here,”

25.01.2026 15:25 β€” πŸ‘ 8    πŸ” 0    πŸ’¬ 3    πŸ“Œ 0

If anyone is making the hard choice not to attend @districtcon.bsky.social because of the weather, I will happily buy your badge.

23.01.2026 19:14 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Is it untoward for me to use this thread to offer to buy a ticket from someone who has had to cancel plans?

23.01.2026 15:33 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

"Prompt Engineering" is starting to feel a lot like just... engineering.

It’s less about finding magic words and more about managing state, memory, and flow control.

We’re back to building state machines, just with fuzzier logic.

21.01.2026 20:59 β€” πŸ‘ 24    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
House subcommittee hearing examines offensive cyber operations, limits of cyber deterrence - Industrial Cyber U.S. House subcommittee hearing examines offensive cyber operations and the limits of cyber deterrence in national security strategy.

Good summary of yesterday’s hearing on Cyber Offense and Deterrence. Testimony seemed good and hit important points, but it’s still not clear to me β€œpublic private partnerships” look like for offensive-oriented deterrence.

industrialcyber.co/critical-inf...

14.01.2026 12:48 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Non-deterministic additions to amateur-drafted contracts seems like a bad idea…

13.01.2026 20:57 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

look upon my works, ye mighty, and let me know what you think

12.01.2026 19:37 β€” πŸ‘ 1401    πŸ” 299    πŸ’¬ 24    πŸ“Œ 6

The freezer inventory is complete and structured, but only available to customers. We await your visit to our table, David!

12.01.2026 02:28 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

For the cocktails, we have canned several jars of homemade cherries, maraschino’d for one’s pleasure. The frozen cherries are for pies.

12.01.2026 02:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0