Adam Dudley

178 posts

Adam Dudley banner
Adam Dudley

Adam Dudley

@AdamDudleyX

Building an open source MCP security scanner. VP & CoS at Nucleus Security. Vulnerability & exposure management, RBVM, AI in cybersecurity. Opinions are my own.

Sarasota, Florida Katılım Şubat 2022
100 Takip Edilen35 Takipçiler
Sabitlenmiş Tweet
Adam Dudley
Adam Dudley@AdamDudleyX·
“If a man does not know to what port he is steering, no wind is favorable to him.” - Seneca
English
0
0
2
63
Bojan Tunguz
Bojan Tunguz@tunguz·
Honestly, even if AI does not improve at all from now on, the capabilities it has right now would be enough to keep me occupied for the rest of my life with all the projects I have on my mind.
English
49
43
717
23.3K
Adam Dudley
Adam Dudley@AdamDudleyX·
Breakdown of mcp-audit, my open source MCP security project, and what shipped in v0.8.0 this weekend. Early feedback from an AI security researcher on X: "the shadow + killchain combo is exactly what's needed right now. most teams have no idea how many MCP servers are actually running in their dev environments. nice work shipping this open source" medium.com/p/mcp-audit-wh…
English
0
0
0
10
Jeremie Strand
Jeremie Strand@jeremie_strand·
@AdamDudleyX the shadow + killchain combo is exactly what's needed right now. most teams have no idea how many MCP servers are actually running in their dev environments. nice work shipping this open source
English
1
1
1
24
Adam Dudley
Adam Dudley@AdamDudleyX·
mcp-audit v0.8.0 ships four commands: shadow → find every MCP server you didn't authorize killchain → cut the most attack paths with the fewest changes diff → security-aware PR reviews for MCP configs snapshot → signed forensic exports for incident response open source, no telemetry
English
2
0
0
17
Adam Dudley
Adam Dudley@AdamDudleyX·
mcp-audit v0.7.0. TypeScript SAST: 18→29 rules, 7 new categories — stack trace disclosure, credential logging, description poisoning, all-interfaces binding. Scoring weights now configurable via policy YAML. Registry at 75 known-good packages. github.com/adudley78/mcp-…
English
0
0
0
7
Adam Dudley
Adam Dudley@AdamDudleyX·
If you suspect your agent is missing key context for the most complete picture to provide the best possible help, ask it what's missing, and it will tell you.
English
0
0
0
5
Adam Dudley
Adam Dudley@AdamDudleyX·
@TheRealAdamG It does seem to be that yes. Impressive how capable Codex with tool use.
English
0
0
0
24
Adam.GPT
Adam.GPT@TheRealAdamG·
It's happened: Codex App > Claude Code/Cowork app.
English
41
16
777
25.7K
Adam Dudley
Adam Dudley@AdamDudleyX·
mcp-audit v0.6.0. TypeScript SAST now covers path traversal, SQL injection, and SSRF — 7 new rules, 11→18 TS total. Plus Bearer auth for --connect and a real fleet dashboard to replace the old table output. github.com/adudley78/mcp-…
English
0
0
0
23
Adam Dudley retweetledi
Nucleus Security
Nucleus Security@nucleussec·
Join Nucleus Security at Detect & Defend 2026. We’ll be in Fürstenfeld on May 6 connecting with cybersecurity leaders and sharing how to turn vulnerability data into clear, actionable risk decisions. If you’re attending, let’s connect.
Nucleus Security tweet media
English
0
1
1
14
Adam Dudley retweetledi
Nucleus Security
Nucleus Security@nucleussec·
What can you know before CISA KEV? Explore the exploitability intelligence gap and how PoC, EPSS & AI reveal risk earlier than KEV listings. Join us May 6: hubs.la/Q04f3XYg0
English
0
1
1
23
Adam Dudley retweetledi
Nucleus Security
Nucleus Security@nucleussec·
Public sector teams: turn vulnerability insight into impact. Join us + @Carahsoft May 12, 2PM EDT to cut noise, reduce backlog & prioritize real risk. 🎓 Earn 1 CPE 👉 hubs.la/Q04dWB5f0
English
0
1
1
19
Adam Dudley
Adam Dudley@AdamDudleyX·
IBM: "For the first time, response is the constraint, not discovery."In 2026? @nucleussec has solved for this since 2019. Kenna named the gap years earlier. Scanners have always outproduced human triage. Mythos didn't shift the constraint. It made it louder.
English
1
0
0
6
Adam Dudley
Adam Dudley@AdamDudleyX·
mcp-audit v0.5.1. The typosquatting scanner was flagging too many short package names. Tightened the threshold for ≤5 char names from 3 edits to 1. Real detections still fire. Noise doesn't. Also: Windows extension scanning + recursive fleet --dir. github.com/adudley78/mcp-…
English
0
0
0
7