Alex Matrosov

9.5K posts

Alex Matrosov banner
Alex Matrosov

Alex Matrosov

@matrosov

Founder @binarly_io · @SBOM_Tools · @REhints | Author “Rootkits & Bootkits" book (https://t.co/1wd2dfYHY6) | Previously: Nvidia · Cylance · Intel · ESET · Yandex

Los Angeles, CA انضم Temmuz 2008
2.3K يتبع19K المتابعون
تغريدة مثبتة
Alex Matrosov
Alex Matrosov@matrosov·
⛓️Confirmed, Intel OEM private key leaked, causing an impact on the entire ecosystem. It appears that Intel BootGuard may not be effective on certain devices based on the 11th Tiger Lake, 12th Adler Lake, and 13th Raptor Lake. Our investigation is ongoing, stay tuned for updates.
Alex Matrosov tweet media
BINARLY🔬@binarly_io

⛓️Digging deeper into the aftermath of the @msiUSA data breach and its impact on the industry. 🔥Leaked Intel BootGuard keys from MSI are affecting many different device vendors, including @Intel , @Lenovo, @Supermicro_SMCI, and many others industry-wide. 🔬#FwHunt is on!

English
40
743
1.8K
1.1M
Alex Matrosov
Alex Matrosov@matrosov·
@chompie1337 @seanhn Not creative ones, or novel attack vectors specifically on compiled code. But more generally, things are evolving so quickly that 12 months ago I would have argued for even mid-level potential.
English
0
0
2
99
chompie
chompie@chompie1337·
@seanhn That all to say, I believe a system could be built that is equivalent to a bordering on mid level researcher. I haven’t seen novel, creative exploit primitives built by an agent yet.
English
3
1
29
2K
Sean Heelan
Sean Heelan@seanhn·
Using CC/Codex in interactive sessions has given me more empathy for scepticism about their use in hard exploit dev scenarios. You are working with a fundamentally diff category of system when you treat agents as a primitive for building search algorithms versus interactive tools
English
6
3
36
6.3K
Alex Matrosov
Alex Matrosov@matrosov·
@julianor I suspect AI triage of SCA results without supporting evidence will have the same effect 🍿
English
0
0
2
191
Juliano Rizzo
Juliano Rizzo@julianor·
Bug bounty programs are collapsing under AI slop. Assessment reports are full of perfectly written false positives nobody reads. Rethink the infosec deliverable. A few things:
English
4
1
13
2K
Alex Matrosov
Alex Matrosov@matrosov·
@AndrewMohawk @Tenzai_Labs I always find these claims interesting coming from a company that hasn’t publicly disclosed a single CVE and is trying to build credibility on CTF scores.
English
1
0
5
320
AndrewMohawk⁽ⁿᵘˡˡ⁾
This article really feels like @Tenzai_Labs paid for it, it doesnt describe/note the CTFs, has "elite, nation-grade offensive capabilities", no stats on anything, not even a link to the research that makes them have to justify these claims?
Forbes@Forbes

The Tenzai cofounders have created an AI hacking agent using OpenAI and Anthropic tools. They say AI has become so adept at hacking it might need regulatory controls, urgently. forbes.com/sites/thomasbr…

English
8
4
50
8.4K
Alex Matrosov
Alex Matrosov@matrosov·
Get insights into your software supply chain, now free and open source. SBOMs are a powerful type of report. If you generate them, make sure you’re collecting and monitoring them at scale.
SBOM-Tools@sbom_tools

🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…

English
0
4
16
3.3K
Alex Matrosov أُعيد تغريده
Alex Matrosov
Alex Matrosov@matrosov·
Shipping a secure open-source project isn’t easy, especially with today’s software supply chain complexity. So I wanted to zoom in and break down what it actually takes (in my case, a Rust project) to ship releases with confidence. I’ve been building @sbom_tools, and just wrapped up a sprint to harden the entire release pipeline. Here’s what the supply chain security posture looks like now: Release Pipeline (fully automated): - Trusted Publishing (OIDC) to , zero long-lived API tokens - SLSA Build Level 3 provenance attached to every GitHub Release - SSH-signed tags with tag immutability enforced at the org level - Tag-to-Cargo.toml version verification + main branch ancestry check CI/CD Security Layers: - 10-job CI gate: clippy, rustfmt, MSRV check, 4-platform test matrix, cargo-deny (licenses + bans + advisories), cargo-audit - CodeQL (Rust native SAST) on every push and PR - 6 fuzz targets covering all SBOM parser entry points - OpenSSF Scorecard running weekly with SARIF integration - All GitHub Actions SHA-pinned, permissions: read-only. Current @OpenSSF Scorecard: 7.5/10 (expecting ~9+ after score recalculation from the latest updates). This is the kind of effort every OSS maintainer should take on, owning your supply chain reduces the risk of putting users in danger.
Alex Matrosov tweet media
English
2
10
65
5.6K
Alex Matrosov أُعيد تغريده
Alex Matrosov
Alex Matrosov@matrosov·
Modern software supply chains have gotten wildly complex, and OSS projects are no exception. I’ve been using GitNexus to build a knowledge graph over the @sbom_tools repo, and it’s beautiful, but also kind of terrifying how much code I’ve been cranking out lately with my buddy @claudeai. github.com/abhigyanpatwar…
Alex Matrosov tweet media
English
1
7
39
3.6K
Alex Matrosov أُعيد تغريده
Alex Matrosov
Alex Matrosov@matrosov·
Most folks treat SBOMs like checkbox compliance. But for enterprises, it’s often the only visibility into vendor dependencies. We upgraded SBOM.Tools quality checks to stop rewarding missing data and to surface stub SBOMs. Check it out and give us feedback.
SBOM-Tools@sbom_tools

x.com/i/article/2027…

English
0
6
21
4.6K
Alex Matrosov
Alex Matrosov@matrosov·
I think the core issue is that LLMs don’t have a priori knowledge of your threat model, so they must perform additional reasoning over the codebase to compensate. Because codebases are dynamic and often large, this reasoning becomes increasingly expensive in terms of tokens. Another challenge is that SAST reports typically provide very limited root-cause evidence. As a result, the LLM has to spend even more tokens digging deeper to validate and understand the findings. My main point is that layering LLMs on top of SAST is not a scalable approach, it quickly becomes cost-prohibitive.
English
0
0
1
76
FeDEX
FeDEX@FetchDEX·
@matrosov @daveaitel While this is true, a different approach that worked well in my experiments was to let LLMs, which understand the threat model, run the SAST tools and then begin the assessment based on those results.
English
1
0
0
61
Alex Matrosov أُعيد تغريده
Alex Matrosov
Alex Matrosov@matrosov·
Nice blog! This hits a real pain point with current SAST tooling. Most of it just runs a bunch of generic checks without understanding the actual threat model or where the real security boundaries are. That lack of semantic context is exactly the issue, I’ve been arguing for a while that detection logic needs to be context-aware, and trying to bolt that on manually with rules just doesn’t scale. This is a very natural place for LLMs to add value. With AI accelerating code production, we also need to move beyond the simple rubric of “bug exists -> reachable -> fix it.” That model breaks down at scale (reachable != exploitable). What’s missing is deeper context around exploitability, and how real is the risk, what’s the blast radius, and what actually matters to fix first. That’s the layer that will drive meaningful prioritization. Also, using LLMs purely for triaging SAST findings after the fact gets expensive very quickly at scale. It’s the easiest path, so a lot of tools go there now, but without deeper integration into the analysis pipeline, it’s a pretty inefficient approach.
Alex Matrosov tweet media
English
1
6
14
2.4K
Alex Matrosov أُعيد تغريده
SBOM-Tools
SBOM-Tools@sbom_tools·
🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…
English
3
39
165
20.6K
Alex Matrosov
Alex Matrosov@matrosov·
@seanhn Nice analogy, you gave me a good laugh :-) Most SAST solutions are a sloppy legacy, ages behind the progress in the field. Feeding LLMs reports packed with CVEs, no real evidence, and mostly noise is useless by design.
English
0
0
3
569
Sean Heelan
Sean Heelan@seanhn·
"Why don't LLMs start from SAST findings?" ... well, for the same reason we don't mount car chassis on a horse.
English
8
5
67
11.1K
Alex Matrosov
Alex Matrosov@matrosov·
@qkaiser It represents over five years of dedication, innovation, and problem-solving in response to the many challenges we encountered throughout this journey. It is a true masterpiece brought to life by the entire team.
English
0
1
8
536
Alex Matrosov
Alex Matrosov@matrosov·
@pr0me Lukas, great stuff as always! I’m looking forward to the second blog, and the code has already aged quite a bit ;-)
English
0
0
1
142
lukas seidel
lukas seidel@pr0me·
@matrosov this is indeed an extension of our blog post, good point sharing it again, Alex, thanks :)
English
1
0
4
263
Alex Matrosov
Alex Matrosov@matrosov·
This is a very interesting piece of research by the team on algorithmic methods for effective complex type recovery. Practical type inference is a challenging problem the industry has been grappling with for years. paper: arxiv.org/abs/2603.08225 blog: binarly.io/blog/type-infe…
Alex Matrosov tweet media
lukas seidel@pr0me

we will present our work on practical binary type recovery at ACM CODASPY '26! prior work rarely focused on applicability: too slow, no meaningful filtering mechanisms, unsound struct recovery we address these gaps and present a system for headless type recovery at scale

English
2
18
87
13.9K
Alex Matrosov
Alex Matrosov@matrosov·
@nitzanfarhi The primary issue with IDA is its asynchronous processing (API limitations). I'm personally eager to see an official Rust API from @HexRaysSA.
English
0
0
0
28
Alex Matrosov
Alex Matrosov@matrosov·
The dream of a fast and reliable binary analysis framework is now a reality. Today, we’re open sourcing VulHunt.RE 🎉 code: github.com/vulhunt-re/vul… docs: vulhunt.re/docs A huge kudos to the entire REsearch team!
Alex Matrosov@matrosov

This year at @REverseConf, we’re dropping something special, a project we’ve been heads-down on for a while that boosts semantic-level binary detection with reachability + taint analysis. Like CodeQL/Semgrep, but for binaries. VulHunt use cases: Vuln REsearch: binarly.io/blog/vulnerabi… Detection Eng: binarly.io/blog/vulhunt-i… VH Intro: binarly.io/blog/vulhunt-i…

English
4
94
382
34.6K
Alex Matrosov أُعيد تغريده
BINARLY🔬
BINARLY🔬@binarly_io·
Since we ❤️ Binary Ninja and @Vector35, we collaborated to bring support for using VulHunt and Binary Ninja together: #binary-ninja" target="_blank" rel="nofollow noopener">vulhunt.re/docs/user-guid…
BINARLY🔬 tweet media
English
0
14
38
3.7K