Daniel Rabinovich

173 posts

Daniel Rabinovich banner
Daniel Rabinovich

Daniel Rabinovich

@blownapp

Founding GTM @ Mindfort (YC X25)

Charlotte, NC Inscrit le Temmuz 2017
40 Abonnements39 Abonnés
Daniel Rabinovich
Daniel Rabinovich@blownapp·
@sec_hub93028 Agent based - majority of the work will be giving good context to agents to do the best possible work.
English
0
0
1
17
SecInterviewHub
SecInterviewHub@sec_hub93028·
How will the cybersecurity industry look like in five years? Agent based? AI assisted? No AI?
English
8
0
14
2.1K
OpenAI Newsroom
OpenAI Newsroom@OpenAINewsroom·
We’re introducing a Bio Bug Bounty for GPT‑5.5 and accepting applications In our ongoing work to strengthen our safeguards for advanced AI capabilities in biology, we’re inviting researchers with experience in AI red teaming, security, or biosecurity to try to find a universal jailbreak that can defeat our 5-question bio safety challenge. Learn more in our blog ⬇️ openai.com/index/gpt-5-5-…
English
77
128
1.8K
139.4K
Y Combinator
Y Combinator@ycombinator·
Congrats to @mindfort on their $3M seed! They're building autonomous AI agents that find, validate, and patch vulnerabilities in production software. Their agents run pentests on every CI/CD push, chain vulnerabilities into working proofs of exploit, and ship fixes as pull requests. mindfort.ai/blog/seed-anno…
English
19
14
137
16.3K
Daniel Rabinovich retweeté
Bud
Bud@budapp·
Introducing Bud. The first AI Human Emulator. Bud has a full computer with storage, compute, and memory to build and code, sms and telegram to communicate, a full browser to use, can create/store/edit files, connect and use your tools, learn custom skills, work fully autonomously, and complete any task end to end just like a human. Text the number below or try free at bud [dot] app. Comment for 100k free credits.
English
2.8K
324
4K
663.2K
Abhishek B R
Abhishek B R@abhitwt·
i am a Vibe Coder, scare me with one word
English
690
4
385
93.9K
Jarrod
Jarrod@Jr0dR87·
Crazy idea. Maybe companies need to spend more time getting basic security controls set up like MFA for every user, before focusing on AI.
English
18
7
79
3.8K
Daniel Rabinovich
Daniel Rabinovich@blownapp·
@hackSultan Bro this doesn’t work, wait till you get hundreds of false positives too. Try to separate real vulns from non real ones. Takes more time than using an actual tool.
English
1
1
7
2.2K
Name cannot be blank
Name cannot be blank@hackSultan·
If you’re vibecoding anything, paste the prompt below In your prompt box and let your agent do a security sweep. [ You are a senior security engineer and red-team specialist tasked with performing a comprehensive, adversarial security audit of the following codebase, system design, or application. Your goal is to identify all possible security vulnerabilities, including common, uncommon, and novel attack vectors. Assume the system will be deployed in a hostile environment with motivated attackers. --- AUDIT SCOPE Analyze the system across all layers, including: - Frontend (UI, client logic, browser storage) - Backend (APIs, business logic, services) - Authentication and authorization flows - Database interactions and storage - Infrastructure and deployment assumptions - Third-party integrations and dependencies --- CORE OBJECTIVES 1. Identify critical, high, medium, and low severity vulnerabilities 2. Detect logic flaws, not just known patterns 3. Surface chained attack paths (multi-step exploits) 4. Highlight unknown or unconventional weaknesses 5. Assume attacker creativity beyond standard checklists --- THREAT MODELING - Define possible attacker profiles (anonymous user, authenticated user, insider, API consumer) - Identify entry points and trust boundaries - Map out sensitive assets (data, tokens, permissions, secrets) --- VULNERABILITY ANALYSIS Check for (but do NOT limit yourself to): ### Authentication & Authorization - Broken auth, weak session management - Privilege escalation (vertical and horizontal) - Insecure password reset flows - Token leakage or reuse ### Input Handling - Injection attacks (SQL, NoSQL, OS command, template injection) - XSS (stored, reflected, DOM-based) - CSRF vulnerabilities - File upload exploits ### Data Security - Sensitive data exposure - Weak encryption or misuse of cryptography - Hardcoded secrets or keys - Insecure storage (localStorage, cookies, logs) ### API & Backend Logic - Broken object-level authorization (IDOR/BOLA) - Mass assignment vulnerabilities - Rate limiting issues / brute force risks - Business logic abuse (race conditions, double spending, bypassing checks) ### Infrastructure & Configuration - Misconfigured headers (CORS, CSP, HSTS) - Open ports, debug endpoints, admin panels - Environment variable leaks - Cloud/storage misconfigurations ### Dependencies & Supply Chain - Vulnerable packages - Unsafe imports or execution - Malicious dependency risks --- ADVANCED / UNKNOWN THREATS Actively attempt to discover: - Non-obvious logic flaws unique to this system - Feature abuse scenarios - State desynchronization issues - Cache poisoning - Replay attacks - Timing attacks - Multi-step exploit chains combining low-severity issues - Any behavior that “shouldn’t be possible” but is --- ADVERSARIAL TESTING MINDSET - Think like an attacker trying to break assumptions - Attempt to bypass validations and safeguards - Manipulate edge cases and unexpected inputs - Explore how different components interact under stress -- OUTPUT FORMAT Provide findings in this structure: ### 1. Vulnerability Summary - Total issues by severity ### 2. Detailed Findings For each vulnerability: - Title - Severity (Critical / High / Medium / Low) - Affected component - Description - Exploitation scenario (step-by-step) - Impact - Recommended fix ### 3. Attack Chains - Show how multiple minor issues could be combined into a major exploit ### 4. Secure Design Recommendations - Architectural improvements - Safer patterns and best practices --- IMPORTANT INSTRUCTIONS - Do NOT assume the code is safe - Do NOT skip analysis due to missing context, infer risks where needed - Be exhaustive and paranoid in your review - If unsure, flag it as a potential risk and explain why ]
English
104
449
3.4K
346.8K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
We will see more hacks than ever because people are gonna rely on AI
English
21
22
257
14.9K
Daniel Rabinovich
Daniel Rabinovich@blownapp·
@shiri_shh If only lovable had capabilities to use agents to test their endpoints like real hackers would... wait.
English
0
0
1
384
shirish
shirish@shiri_shh·
Vercel got hit yesterday… and Lovable is the NEXT one on fire RIGHT NOW. Any free user can read your full codebase, prod creds, AI chat histories, and live customer records if you built before Nov 2025. precisely why Anthropic is holding Claude Mythos back from the public. Their new model is scary good at hacking and finding zero-days.
shirish tweet media
impulsive@weezerOSINT

Lovable has a mass data breach affecting every project created before november 2025. I made a lovable account today and was able to access another users source code, database credentials, AI chat histories, and customer data are all readable by any free account. nvidia, microsoft, uber, and spotify employees all have accounts. the bug was reported 48 days ago. its not fixed. They marked it as duplicate and left it open.

English
40
22
261
68K
Daniel Rabinovich
Daniel Rabinovich@blownapp·
@shiri_shh another reason why securing yourself now with agents is the best way to fight against them
English
0
0
7
6.7K
Floro S.
Floro S.@sflorimm·
what are you building right now? Describe it in 5 words max + link. I’ll rate it out of 10. and no, don't be afraid that someone will steal your idea, there are limitless ideas spreading right now.
English
165
2
81
7.5K
Daniel Rabinovich
Daniel Rabinovich@blownapp·
Coming from an SEO, this doesn't actually mean anything. This doesn't = getting cited by LLMs magically. Cloudflare is fine, and prob won't even use their own tool. Remember, LLMs.txt was also a fad.
Daniel Rabinovich tweet media
English
0
0
1
144
Ryushe
Ryushe@0xRyushe·
@theo Solved everything I've thrown at it so far. (currently working low level with android software) So, I'd say pretty good
English
1
0
1
4.1K
Theo - t3.gg
Theo - t3.gg@theo·
How are people feeling about opus 4.7 so far?
English
793
14
1.7K
384.9K