NextGenRails™

232 posts

NextGenRails™ banner
NextGenRails™

NextGenRails™

@NextGenRails

Founder @ NextGenRails™ | Built https://t.co/12zRapuMNS · https://t.co/DwaE0fJ0ks · https://t.co/gJR3lH1AP5 | Cryptographic compliance infrastructure | Trust is computed.

Katılım Mart 2026
56 Takip Edilen8 Takipçiler
Sabitlenmiş Tweet
NextGenRails™
NextGenRails™@NextGenRails·
What we've built at NextGenRails™: cbomcompliance.com — cryptographic SBOM receipts. SHA-384, RS256, Bitcoin-anchored. If your software was clean before the attack, prove it. An SBOM is a claim. A receipt is evidence. cbomdirectory.com — the definitive resource for understanding what a Cryptographic Bill of Materials actually is and why an SBOM alone isn't enough. cuistandard.com — CUI scoping toolkit for CMMC Level 2. All 110 NIST SP 800-171 controls mapped, COPR decision framework, SSP example. $199. Instant download. 20022validator.com — cryptographic receipts for ISO 20022 messages. Prove your payment message was valid before it hit the wire. Built for SWIFT MT-MX migration and DORA compliance. 20022api.com — same cryptographic engine, callable via REST. Integrate message validation directly into your pipeline. In active development. statutoryregistry.com — cryptographic notary for legal instruments and compliance filings. SHA-384 Merkle-committed, RS256-signed. Supports DORA, NIS2, EU CRA, CMMC 2.0. stackrift.net — where serious builders get discovered first. 8 live platforms. One infrastructure. Trust is not declared. It is computed. nextgenrails.net #buildinpublic #cybersecurity #CMMC #SBOM #ISO20022 #DORA #infosec #devtools
English
0
0
1
152
NextGenRails™
NextGenRails™@NextGenRails·
@evilmartians The systemic approach needs one more layer. Cryptographic proof of what your stack looked like before the attack happened. Every mitigation you implement is reactive. A pre-incident receipt is the only thing that answers what existed before. cbomcompliance.com
English
0
0
0
8
NextGenRails™
NextGenRails™@NextGenRails·
@github When attackers steal your code, they have it. That's done. You can't undo it. But here's what most organizations can't answer after a breach. What exactly was in those repositories before the attack? Was the stolen code already vulnerable, or did the attacker introduce something? Were you compliant before this happened? Can you prove any of it? To regulators, to insurers, to customers, to a federal court. You can't prove it with logs. Logs can be tampered. You can't prove it with memory. Memory is not evidence. You can't prove it with a claim. A claim is not proof. The only thing that holds up is a cryptographic receipt. A mathematically signed, timestamped, independently verifiable record of exactly what existed before the access window opened. That's your safe harbor. That's your litigation defense. That's the difference between an organization that can demonstrate pre-incident compliance and one that is guessing in front of a regulator. EO 14028, the EU Cyber Resilience Act, CMMC. All converging on the same requirement. Prove what was in your software. NextGenRails built that infrastructure. Not to stop the breach. To prove what you had before it.
English
0
0
0
95
GitHub
GitHub@github·
1/ We are sharing additional details regarding our investigation into unauthorized access to GitHub's internal repositories. Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately.
English
504
3.2K
10.1K
5.2M
NextGenRails™
NextGenRails™@NextGenRails·
When attackers steal your code, they have it. That's done. You can't undo it. But here's what most organizations can't answer after a breach. What exactly was in those repositories before the attack? Was the stolen code already vulnerable, or did the attacker introduce something? Were you compliant before this happened? Can you prove any of it? To regulators, to insurers, to customers, to a federal court. You can't prove it with logs. Logs can be tampered. You can't prove it with memory. Memory is not evidence. You can't prove it with a claim. A claim is not proof. The only thing that holds up is a cryptographic receipt. A mathematically signed, timestamped, independently verifiable record of exactly what existed before the access window opened. That's your safe harbor. That's your litigation defense. That's the difference between an organization that can demonstrate pre-incident compliance and one that is guessing in front of a regulator. EO 14028, the EU Cyber Resilience Act, CMMC. All converging on the same requirement. Prove what was in your software. NextGenRails built that infrastructure. Not to stop the breach. To prove what you had before it.
English
1
0
0
34
NextGenRails™
NextGenRails™@NextGenRails·
@blade_nd The attack surface keeps expanding. VS Code extensions yesterday. AI context windows today. the answer is always the same, cryptographic proof of what existed before the trust was broken.
English
0
0
0
32
Erick
Erick@blade_nd·
The next attack window will be Claude and Codex context window and historical chats. And yes they do store it according to their TOS. If you feel like you ever leaked a secret via AI, rotate them ASAP!
GitHub@github

We are investigating unauthorized access to GitHub’s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity.

English
8
9
188
28.3K
NextGenRails™
NextGenRails™@NextGenRails·
@billyxbonka @github GitHub's own words: "detected and contained." that's catching it. the data was already gone before they knew, which is exactly the point.
English
0
0
0
41
billy
billy@billyxbonka·
@NextGenRails @github Although Github is not transparent enough my understanding so far is that they didnt detect the malicious extension, they detected they they were breached and lost bunch of sensitive stuff. Thus it is an investigation not a detection
English
1
0
1
68
NextGenRails™
NextGenRails™@NextGenRails·
Microsoft told their own developers to avoid this exact behavior. their own marketplace. their own guidance. their own employee. the attack vector was always trust — not technology. the only answer is cryptographic proof of what was in your stack before the trust was broken. cbomcompliance.com
English
0
0
0
355
vx-underground
vx-underground@vxunderground·
GitHub, a company owned by Microsoft, was compromised. A GitHub employee browsing the VS Code marketplace, an asset owned and operated by Microsoft, inadvertently donated a malicious VS Code extension, which Microsoft offers guidance and best practices on to avoid
vx-underground tweet media
GitHub@github

1/ We are sharing additional details regarding our investigation into unauthorized access to GitHub's internal repositories. Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately.

English
58
422
4.5K
335.5K
NextGenRails™
NextGenRails™@NextGenRails·
BTC block 950251 confirms. the Rev-2 upgrade is permanently anchored to the Bitcoin blockchain as of 2026-05-20 PST. SHA256: 2ccfc63895954068f06677381909855fefbbcc9a0b6b6c49c90 mathematically proven. immutable. forever.
English
0
0
0
31
NextGenRails™
NextGenRails™@NextGenRails·
last night GitHub got breached via a poisoned VS Code extension. a supply chain attack. through a developer tool. NextGenRails shipped the answer tonight. upload your .vscode/extensions.json and get a cryptographic receipt of your entire extension stack. signed. Merkle-rooted. Bitcoin-anchored. timestamped to the minute. if a malicious extension hits your team tomorrow — you can prove what was installed before it. Rev-2 now runs 4 vulnerability intelligence sources simultaneously: — Internal rule engine — OSV (Open Source Vulnerabilities) — NVD (National Vulnerability Database) — GHSA (GitHub Advisory Database) every CVE is scored with EPSS — the probability it gets exploited in the wild within 30 days. AGPL. GPL. SSPL. license risk flagged automatically. AI model cards. receipted. base model, datasets, and lineage — cryptographically proven. compare any two signed receipts. see exactly what changed. added dependencies. removed packages. version upgrades. risk delta. one RS256-signed JWS receipt. SHA-384 Merkle root. Bitcoin-anchored provenance. SHA256: 2ccfc63895954068f06677381909855fefbbcc9a0b6b6c49c90 BTC block: [pending] this is what software provenance looks like in 2026.
English
2
0
1
52
NextGenRails™
NextGenRails™@NextGenRails·
@billyxbonka @github You're right. they detected it. that's actually the point. Most organizations don't have GitHub's resources to catch it. They find out when it's too late to prove what their stack looked like before. That's the problem we solve.
English
1
0
0
120
NextGenRails™
NextGenRails™@NextGenRails·
last night GitHub got breached via a poisoned VS Code extension. a supply chain attack. through a developer tool. NextGenRails shipped the answer tonight. upload your .vscode/extensions.json and get a cryptographic receipt of your entire extension stack. signed. Merkle-rooted. Bitcoin-anchored. timestamped to the minute. if a malicious extension hits your team tomorrow — you can prove what was installed before it. Rev-2 now runs 4 vulnerability intelligence sources simultaneously: — Internal rule engine — OSV (Open Source Vulnerabilities) — NVD (National Vulnerability Database) — GHSA (GitHub Advisory Database) every CVE is scored with EPSS — the probability it gets exploited in the wild within 30 days. AGPL. GPL. SSPL. license risk flagged automatically. AI model cards. receipted. base model, datasets, and lineage — cryptographically proven. compare any two signed receipts. see exactly what changed. added dependencies. removed packages. version upgrades. risk delta. one RS256-signed JWS receipt. SHA-384 Merkle root. Bitcoin-anchored provenance. SHA256: 2ccfc63895954068f06677381909855fefbbcc9a0b6b6c49c90 BTC block: [pending] this is what software provenance looks like in 2026.
English
0
0
0
33
NextGenRails™
NextGenRails™@NextGenRails·
last night GitHub got breached via a poisoned VS Code extension. a supply chain attack. through a developer tool. NextGenRails shipped the answer tonight. upload your .vscode/extensions.json and get a cryptographic receipt of your entire extension stack. signed. Merkle-rooted. Bitcoin-anchored. timestamped to the minute. if a malicious extension hits your team tomorrow — you can prove what was installed before it. Rev-2 now runs 4 vulnerability intelligence sources simultaneously: — Internal rule engine — OSV (Open Source Vulnerabilities) — NVD (National Vulnerability Database) — GHSA (GitHub Advisory Database) every CVE is scored with EPSS — the probability it gets exploited in the wild within 30 days. AGPL. GPL. SSPL. license risk flagged automatically. AI model cards. receipted. base model, datasets, and lineage — cryptographically proven. compare any two signed receipts. see exactly what changed. added dependencies. removed packages. version upgrades. risk delta. one RS256-signed JWS receipt. SHA-384 Merkle root. Bitcoin-anchored provenance. SHA256: 2ccfc63895954068f06677381909855fefbbcc9a0b6b6c49c90 BTC block: [pending] this is what software provenance looks like in 2026.
English
0
0
0
25
NextGenRails™
NextGenRails™@NextGenRails·
last night GitHub got breached via a poisoned VS Code extension. a supply chain attack. through a developer tool. NextGenRails shipped the answer tonight. upload your .vscode/extensions.json and get a cryptographic receipt of your entire extension stack. signed. Merkle-rooted. Bitcoin-anchored. timestamped to the minute. if a malicious extension hits your team tomorrow — you can prove what was installed before it. Rev-2 now runs 4 vulnerability intelligence sources simultaneously: — Internal rule engine — OSV (Open Source Vulnerabilities) — NVD (National Vulnerability Database) — GHSA (GitHub Advisory Database) every CVE is scored with EPSS — the probability it gets exploited in the wild within 30 days. AGPL. GPL. SSPL. license risk flagged automatically. AI model cards. receipted. base model, datasets, and lineage — cryptographically proven. compare any two signed receipts. see exactly what changed. added dependencies. removed packages. version upgrades. risk delta. one RS256-signed JWS receipt. SHA-384 Merkle root. Bitcoin-anchored provenance. SHA256: 2ccfc63895954068f06677381909855fefbbcc9a0b6b6c49c90 BTC block: [pending] this is what software provenance looks like in 2026.
English
0
0
0
13
Pato Molina
Pato Molina@patomolina·
Hackean GitHub (de Microsoft) porque un empleado (de Microsoft) instaló una extensión con malware en VS Code (de Microsoft), cuyo marketplace de extensiones está "moderado" por Microsoft. Hace años que es un peligro instalar extensiones de VS Code porque el control es casi nulo.
GitHub@github

1/ We are sharing additional details regarding our investigation into unauthorized access to GitHub's internal repositories. Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately.

Español
9
134
1.2K
106.9K
NextGenRails™
NextGenRails™@NextGenRails·
last night GitHub got breached via a poisoned VS Code extension. a supply chain attack. through a developer tool. tonight cbomcompliance.com ships the answer. you can now upload your .vscode/extensions.json and get a cryptographic receipt of your entire extension stack. signed. Merkle-rooted. Bitcoin-anchored. timestamped to the minute. if a malicious extension hits your team tomorrow — you can prove what was installed before it. that's not all. Rev-2 now runs 4 vulnerability intelligence sources simultaneously: — Internal rule engine — OSV (Open Source Vulnerabilities) — NVD (National Vulnerability Database) — GHSA (GitHub Advisory Database) every CVE is scored with EPSS — the probability it gets exploited in the wild within 30 days. AGPL. GPL. SSPL. license risk flagged automatically. AI model cards. receipted. your base model, datasets, and lineage — cryptographically proven. compare any two signed receipts. see exactly what changed. added dependencies. removed packages. version upgrades. risk delta. one RS256-signed JWS receipt. SHA-384 Merkle root. Bitcoin-anchored provenance. SHA256: 2ccfc63895954068f06677381909855fefbbcc9a0b6b6c49c90 BTC block: [pending] this is what software provenance looks like in 2026. cbomcompliance.com
English
0
0
0
11
GitHub
GitHub@github·
We are investigating unauthorized access to GitHub’s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity.
English
1.6K
5.2K
24.3K
12.3M
NextGenRails™
NextGenRails™@NextGenRails·
tonight's breach made us think about our own infrastructure. so NextGenRails ran all 11 repos through cbomcompliance.com. 118 components. one master SBOM. one cryptographic receipt. timestamped to the minute. if anything happens to our codebase tomorrow — we can prove what it looked like tonight. that's the point.
English
0
0
0
603
NextGenRails™
NextGenRails™@NextGenRails·
tonight's breach made us think about our own infrastructure. so NextGenRails ran all 11 repos through cbomcompliance.com. 118 components. one master SBOM. one cryptographic receipt. timestamped to the minute. if anything happens to our codebase tomorrow — we can prove what it looked like tonight. that's the point.
English
0
0
0
30