Giuseppe N3mes1s's Avatar

Giuseppe N3mes1s

@n3mes1s.bsky.social

An Operating System lover, was EDR chef and purple teamer. Trying to replace myself with an Agentic AI.

38 Followers  |  18 Following  |  5 Posts  |  Joined: 25.11.2024  |  1.7507

Latest posts by n3mes1s.bsky.social on Bluesky

Post image

False positives waste your time.
False negatives cost you breaches.

At @BlackHatEvents , @moyix shows how XBOW agents fight false positives β€” validating real exploits at scale, in hours.

πŸ“Aug 7 | 11:20am

28.07.2025 15:02 β€” πŸ‘ 3    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
The lethal trifecta for AI agents Plus reviews of two new papers about prompt injection, and Anthropic's tips on building multi-agent LLM systems

Sent out a new edition of my email newsletter (which is very genuinely just recent from my blog reformatted into newsletter form) and it turns out it's basically ALL prompt injection this week - two detailed paper reviews and my piece on the lethal trifecta simonw.substack.com/p/the-lethal...

17.06.2025 15:30 β€” πŸ‘ 58    πŸ” 7    πŸ’¬ 3    πŸ“Œ 2
Preview
An Introduction to Google’s Approach to AI Agent Security Here’s another new paper on AI agent security: An Introduction to Google’s Approach to AI Agent Security, by Santiago DΓ­az, Christoph Kern, and Kara Olive. (I wrote about a different …

Another prompt injection paper review! This time it's "An Introduction to Google’s Approach to AI Agent Security" by Santiago DΓ­az, Christoph Kern, and Kara Olive

Some interesting ideas in here, particularly around Google's three core principles for agent security simonwillison.net/2025/Jun/15/...

15.06.2025 05:32 β€” πŸ‘ 80    πŸ” 12    πŸ’¬ 2    πŸ“Œ 0
Preview
Model Context Protocol has prompt injection security problems As more people start hacking around with implementations of MCP (the Model Context Protocol, a new standard for making tools available to LLM-powered systems) the security implications of tools built ...

Model Context Protocol has prompt injection security problems
simonwillison.net/2025/Apr/9/m...

09.04.2025 13:01 β€” πŸ‘ 117    πŸ” 21    πŸ’¬ 9    πŸ“Œ 3
Preview
Failure Modes of OpenAI Operator | Notion Blog link: https://tinyurl.com/4xp5ms5s

All the hype around OpenAI Operator but no one is really testing it. Failure modes are spiking and the problems are always the same

Failed 5/5 tests

Common problems:

Do not know how to use tools
Do not follow very well the instructions sometimes

twisty-oval-d44.notion.site/Failure-Mode...

27.01.2025 06:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Screenshot showing execution of the command `curl -s 'http://localhost:8000/cgi-bin/zoo_loader.cgi?request Execute&service-WPS&version=1.0.0&Identifier-echo&DataInputs-a-Reference@mimeType=text/plain@cache_file=/etc/passwd;b=value;c=value | pygmentize -l xml` and the output, including the target machine’s /etc/passwd embedded in the XML.

Screenshot showing execution of the command `curl -s 'http://localhost:8000/cgi-bin/zoo_loader.cgi?request Execute&service-WPS&version=1.0.0&Identifier-echo&DataInputs-a-Reference@mimeType=text/plain@cache_file=/etc/passwd;b=value;c=value | pygmentize -l xml` and the output, including the target machine’s /etc/passwd embedded in the XML.

XBOW found a critical path traversal vulnerability in ZOO-Project (CVE-2024-53982). The vulnerability exists in the Echo example (enabled by default) and allows an attacker to retrieve any file on the server. Users should upgrade to the latest version.

05.12.2024 17:11 β€” πŸ‘ 8    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Discrepancy between what's in GitHub and what's been published to PyPI for v8.3.41 Β· Issue #18027 Β· ultralytics/ultralytics Bug Code in the published wheel 8.3.41 is not what's in GitHub and appears to invoke mining. Users of ultralytics who install 8.3.41 will unknowingly execute an xmrig miner. Examining the file util...

Apparent supply chain attack on Ultralytics, a popular AI Python library. Threat actor managed to insert cryptojacking functionality into specific versions (which have since been removed from PyPI).
github.com/ultralytics/...

05.12.2024 14:53 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0

Even easier tomorrow when someone is going to just enable your rat to attach as use this MCP protocol you are running with code execution

05.12.2024 13:43 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I kinda tend to agree. But I hope soon we will build and have counter measures. At the end of the day it is just another process doing stuff on my computer. Will be interesting to see if a new product will arise from this or will be absorbed by the current market

04.12.2024 05:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Exclusive: The backdoor inserted in v1.95.7 adds an "addToQueue" function which exfiltrates the private key through seemingly-legitimate CloudFlare headers.

Calls to this function are then inserted in various places that (legitimately) access the private key.

03.12.2024 23:47 β€” πŸ‘ 49    πŸ” 32    πŸ’¬ 3    πŸ“Œ 2

I really hope to never see any of this in any logs coming from edr products. Or at least I hope we will have a good way to track the β€œundefined” behavior of this kind if applications. Agreeing on this is opening to new security risks

03.12.2024 20:25 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0
Practical LLM Security: Takeaways From a Year in the Trenches
YouTube video by Black Hat Practical LLM Security: Takeaways From a Year in the Trenches

If you missed my blackhat talk on the security of LLM applications, it's up on youtube now:

m.youtube.com/watch?v=Rhpq...

28.11.2024 12:25 β€” πŸ‘ 19    πŸ” 8    πŸ’¬ 1    πŸ“Œ 1

Hello world. Mostly going to talk about intersection between cybersec and genai. Going to love where we are going with all this new technology without adding any control.

26.11.2024 19:06 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@n3mes1s is following 18 prominent accounts