고정된 트윗
XavSecOps
1.6K posts

XavSecOps
@XavSecOps
DevOps, SecOps , AI Implementation AI is more than just intel, it's your new SysAdmin. Automating workflows, securing the stack, and redefining Red/Blue teaming
가입일 Temmuz 2018
2.8K 팔로잉988 팔로워

The latest coding-agent news keeps pointing to the same conclusion:
AI coding security is becoming a runtime problem, not a prompt-safety problem.
You can patch jailbreaks all day.
If install scope, command expansion, repo-local scripts, and network egress are still sloppy, the blast radius is still sloppy.
The interesting product category is no longer “best coding model.”
It is “smallest credible blast radius.”
English

If you care about actually red teaming LLM apps instead of just demoing them, garak still deserves attention.
It treats model security more like offensive testing than prompt advice: jailbreaks, leakage, prompt injection, hallucination, toxicity, and adaptive probes across real endpoints.
The interesting part is not “one more eval tool.” It is the shift toward repeatable adversarial workflows.

English

Most MCP security talk is still happening before install. The real problem starts after a server is trusted and its instructions or tool surface change underneath you.
trailofbits/mcp-context-protector is worth a look because it pins server configs, blocks silent changes, sanitizes responses, and quarantines suspicious tool output.
That is much closer to the real MCP risk model: a live trust-boundary problem, not a one-time review.

English

Everyone calls their product an "AI security tool."
Strix actually runs your code, finds exploitable vulns, and validates them with working proof-of-concepts.
Integrates into CI/CD. On every pull request, not just a quarterly pentest.
The gap between AI-assisted security theater and agents that actually exploit things is getting clearer.
github.com/usestrix/strix

English

browser vendors, network vendors, endpoint vendors, and AI coding platforms are all shipping “discover / govern AI agents” features.
That usually means the market has already moved past “are agents real?”
Now the fight is over who owns the control plane.
My bet: the winner won’t be the loudest model vendor.
It’ll be the platform that can map agent actions to real permissions, real identities, and real rollback.
English

Most security scanners tell you what might be vulnerable.
Shannon reads your source code, maps attack vectors, and runs real exploits to prove it.
White-box, autonomous, TypeScript. Works on web apps and APIs.
Found 20+ critical vulns in OWASP Juice Shop including auth bypass and DB exfiltration.
The shift from "scan and report" to "read, reason, exploit" is already here.

English

Offensive AI is turning into a cloud primitive faster than most teams expected.
The interesting split won’t be who finds one flashy bug in a demo.
It’ll be who can run bounded recon, validation, and retest loops with usable evidence, scope control, and clean human handoff.
That’s where agentic pentesting stops being hype and becomes an ops layer.
English

Most teams are still treating agent security as a prompt problem.
It’s turning into a control-plane problem.
SentinelGate is a good example of the shift: an MCP proxy that enforces RBAC/CEL rules and logs tool calls before they touch the system.
That is much closer to how high-trust agents will actually get deployed.

English




