Appsecco

3.5K posts

Appsecco banner
Appsecco

Appsecco

@appseccouk

The Application Security Company

London Katılım Nisan 2015
135 Takip Edilen1.9K Takipçiler
Appsecco
Appsecco@appseccouk·
Honored to be featured in @CloudSecList Issue 320 🙌 Our vulnerable-mcp-servers-lab is a training ground for security professionals to learn pentesting MCP (Model Context Protocol) servers. MCP is becoming the backbone of AI agent integrations. Understanding its security gaps today means protecting your AI infrastructure tomorrow. Try it out 👇 github.com/Appsecco/vulne… #RedTeam #AISecurity #AppSec
Appsecco tweet media
English
0
0
2
84
Appsecco
Appsecco@appseccouk·
We are open sourcing the vulnerable MCP servers we coded for the Pentesting MCP Servers workshop at BSides London. Last Saturday, I ran a 4-hour hands-on workshop at Security BSides London teaching folks how to pentest MCP servers and AI agents. To make it practical, I built a collection of intentionally vulnerable MCP servers covering real attack scenarios - Injection vulnerabilities - Auth bypass paths - Misconfigured trust boundaries - Hidden functionality exposure - Prompt injection surfaces The workshop sold out and the feedback was clear - people want reproducible labs they can break, learn from, and practice on. So we're releasing the entire collection on our Appsecco’s GitHub later this week after some bug fixes. This is for pentesters who want to understand MCP attack surfaces, product security engineers building with MCP, AI red teamers, and anyone who learns by breaking things in a safe environment. Real vulnerabilities. Real exploitation. Reproducible locally. Follow Appsecco to catch the release. We'll share setup guides, attack walkthroughs, and the updated MCP Pentesting Checklist v2.0 alongside it. My contribution on the journey from Pentester to AI Red Teamer. #pentesting #aisecurity #mcp #mcpsecurity
English
0
1
2
168
Appsecco
Appsecco@appseccouk·
CVE-2025-55182 (React RCE) is now fully weaponized. PoCs are out. Attackers are already scanning. Here’s a quick demo showing how we detect and exploit the vulnerability using Burp Suite, including Active Scan Plus and a manual multipart payload. If you’re running React Server Components or Next.js, patch today. Don’t rely on LLM-generated fixes. Verify them. #React #NextJS #AppSec #AISecurity
English
0
1
1
302
Appsecco
Appsecco@appseccouk·
Our Chief Hacker at Kloudle and Appsecco wants to know who in our connections uses #Kubernetes. Quick poll in the post!
Riyaz Walikar@riyazwalikar

I fondly remember my first #kubernetes cluster pentest several years ago. Gained cluster admin by reading protected credentials using a binary planting/path confusion bug! Fun times! 😎 🎊 I'm running a poll to know who in my connections is using Kubernetes in prod?

English
0
0
1
329
Appsecco retweetledi
DeTaSECURE
DeTaSECURE@DeTaSECURE·
Please follow @InfosecJourneys on LinkedIn and Twitter. It is an one of a kind podcast and a deep dive into the mind of people who are moving mountains in Information Security.
English
0
4
4
0