Jose Selvi

5.6K posts

Jose Selvi banner
Jose Selvi

Jose Selvi

@JoseSelvi

Offensive Security & AI/ML enthusiast

Katılım Ocak 2010
277 Takip Edilen4.4K Takipçiler
Jose Selvi
Jose Selvi@JoseSelvi·
A few weeks ago, I coded an HTTP to MCP bridge, so you can use your favorite HTTP tools to assess the functionality exposed by a remote MCP server. It would be great if you could contribute with your feedback. Thanks! nccgroup.com/us/research-bl…
English
0
0
2
228
Jose Selvi
Jose Selvi@JoseSelvi·
I have seen many articles written on MCP and its security, but I think there is still room for some in-depth analysis and for some security tips resulting from it. Even if you have read other articles, you may still learn a thing or two. Do have a read! nccgroup.com/us/research-bl…
English
0
1
2
255
Jose Selvi retweetledi
Luke Rogerson
Luke Rogerson@NullMode_·
Great post from @JoseSelvi on securing MCP (Model Context Protocol) setups for LLMs 👇 nccgroup.com/us/research-bl… It sparked a few thoughts on how we might start building secure-by-default patterns into MCP clients and servers: ❓Should these run in containers out of the box, with sandboxing guidance baked in? ❓Could we ship default firewall rules scoped to common tool usage? ❓Maybe even a prompt injection filter layer between the LLM and MCP server - especially if tools come from untrusted sources? If MCP is going to be a standard for tool-using agents, now’s the time to start hardening the foundation - before it becomes widely adopted and harder to retrofit. Anyone already working on this?
English
0
1
1
218
Jose Selvi
Jose Selvi@JoseSelvi·
Have you ever used PyRIT for AI Security Assessments and Red Teaming? Learn how it works under the hood and maintain control of the process by proxying it! nccgroup.com/us/research-bl…
English
0
2
4
382
Jose Selvi
Jose Selvi@JoseSelvi·
@pwntester @ctbbpodcast @nmatt0 Happy to see that Delorean is still useful 10 years later. Time doesn't matter, or well... it does if you use Delorean 😉
English
1
0
2
83
Jose Selvi retweetledi
Critical Thinking - Bug Bounty Podcast
If you need to spin up a spoofed NTP server, try using Delorean! Features include: ✅ Flag-based config for custom scenarios. ✅ Static, random, or relative time adjustments. ✅ Integrates with ntpdate. (Featured in @nmatt0's bug of 2024) Check it out: loom.ly/vT2lfTk
English
1
4
31
2.5K
Jose Selvi
Jose Selvi@JoseSelvi·
Great to see tools like @radareorg and #evilwinrm incorporating AI-powered capabilities. Looking forward to seeing others do the same!
English
0
0
2
191
Jose Selvi retweetledi
Óscar Alfonso Díaz
Óscar Alfonso Díaz@OscarAkaElvis·
Fresh meat! We've created a new Evil-WinRM branch with integrated multiple AI LLM support. New docker image, new gem (gem install evil-winrm-ai) and new possibilities Check it out and let us know what you think github.com/Hackplayers/ev… Happy hacking #evilwinrm #hacking #llm #ai
English
0
6
21
1.6K
Jose Selvi
Jose Selvi@JoseSelvi·
Thanks to @NavajaNegra_AB for giving me the opportunity to share my experience with transformers and AI security with such an amazing audience. It was great to spend a few days meeting and old friends, and also to make new ones! This is why I love this event. See you next year!
Jose Selvi tweet media
English
0
6
14
728
Jose Selvi retweetledi
Johann Rehberger
Johann Rehberger@wunderwuzzi23·
🔥 Microsoft fixed a high severity data exfiltration exploit chain in Copilot that I reported earlier this year. It was possible for a phishing mail to steal PII via prompt injection, including the contents of entire emails and other documents. The demonstrated exploit chain consists of techniques that didn't even exist 2 years ago. 🔥 In particular, it involves: 1. Prompt Injection 💉 2. Automatic Tool Invocation (without human in loop) to bring PII into chat context ⚙️ 3. ASCII Smuggling 🫣 4. Rendering of benign link + invisible text 👀 5. (Optional) Conditional instructions to only trigger when certain users view the content ☝️ Discussing two demos (stealing sales data and MFA codes), including the videos I had shared with MSRC in February. @simonw @goodside @llm_sec embracethered.com/blog/posts/202…
English
7
70
268
73.4K
Jose Selvi retweetledi
Clint Gibler
Clint Gibler@clintgibler·
🤖 TL;DR: Every AI Talk from Hacker Summer Camp 2024 There were >60 AI-related talks at @BSidesLV, @BlackHatEvents, and @defcon this year I wanted to know what everyone was working on, so I gathered all of the talks in one place And then summarized their abstracts in 1 (and then 2-3 sentences) and grouped them by category So you can quickly grok >60 talks in ~15min tldrsec.com/p/tldr-every-a…
Clint Gibler tweet media
English
6
47
133
14.4K
Jose Selvi retweetledi
Anvil Secure
Anvil Secure@anvil_secure·
Our latest blog is now live courtesy of @Kachakil! After an accidental discovery and no small amount of poking around, Daniel wrote up his experience identifying and reporting vulnerabilities in the Homepage dashboard. Check it out here: anvilsecure.com/blog/vulnerabi…
English
0
4
3
489
Jose Selvi retweetledi
Tavis Ormandy
Tavis Ormandy@taviso·
This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
Tavis Ormandy tweet media
English
245
3.1K
15.4K
3.3M
Jose Selvi retweetledi
Wiz
Wiz@wiz_io·
Wiz Research discovered a vulnerability in @Ollama that let them compromise any exposed Ollama server. 😲 📷 This flaw could allow attackers to gain remote code execution and alter prompt answers to generate misleading information.
Wiz tweet media
English
1
6
6
1.5K
Jose Selvi retweetledi
Vaibhav Tulsyan
Vaibhav Tulsyan@xennygrimmato_·
Great results on CyberSecEval 2! "Project Naptime", an agent from the Project Zero team at Google, achieves new top scores of 100% on the “Buffer Overflow" tests (from 5%) and 76% on the "Advanced Memory Corruption" tests (from 24%).
Vaibhav Tulsyan tweet media
English
1
4
18
2.2K
Jose Selvi
Jose Selvi@JoseSelvi·
Is refusing to use a LLM the modern equivalent to not wanting to use the spell checker of your favorite text editor? When used properly, it's an amazing tool that nobody should mind using.
English
0
0
4
232