Max Andreacchi

20 posts

Max Andreacchi banner
Max Andreacchi

Max Andreacchi

@atomicchonk

AI Security Researcher and Red Teamer at SpecterOps | Corgi Dad

United States Katılım Eylül 2025
135 Takip Edilen28 Takipçiler
Max Andreacchi
Max Andreacchi@atomicchonk·
Security researchers trying to keep up with the @claudeai feature drops this week
Max Andreacchi tweet media
English
0
0
0
16
Max Andreacchi
Max Andreacchi@atomicchonk·
Finally, understand that there is now a chain to secure and not a standalone node or point. The docs, apps, links, and other resources the agent interacts need to all be accounted for in threat modeling. x/x
English
0
0
0
17
Max Andreacchi
Max Andreacchi@atomicchonk·
Things to keep in mind on both the offensive and defensive sides of the fence: - With additional capability comes an additional attack surface (mobile phone) - Frontier models are improving their guardrails, but the gaps still exist - 3/x
English
1
0
0
29
Max Andreacchi
Max Andreacchi@atomicchonk·
I’d be remiss if I didn’t point out the chonky block of safety considerations at the bottom. 2/x
Max Andreacchi tweet media
English
0
0
0
14
Max Andreacchi
Max Andreacchi@atomicchonk·
@_xpn_ It’s at minimum eye opening, I’ll say that much 😆
English
0
0
1
22
Adam Chester 🏴‍☠️
So y’all just point your attention to something… and it just.. stays on the thing?!! You’re telling me that you don’t have the white noise, cotton wool, “hey check this other thing out”, “what ever happens to the fail whale?” brains???
GIF
English
2
0
13
1.5K
Max Andreacchi retweetledi
SpecterOps
SpecterOps@SpecterOps·
Stack spoofing isn’t dead. Hear from @klezvirus at #BHEU on how modern detection still breaks, and unveils the first CET-compliant stack spoofing framework. Learn more ➡️ ghst.ly/4izmuou
SpecterOps tweet media
English
2
21
46
5.1K
Max Andreacchi retweetledi
SpecterOps
SpecterOps@SpecterOps·
SCOM monitors critical systems, but insecure defaults make it a powerful attack vector. At #BHEU, @unsigned_sh0rt & @breakfix show how to abuse SCOM for credential theft, lateral movement, and domain escalation, plus how to defend it. ghst.ly/4aoggph
SpecterOps tweet media
English
0
31
72
24.3K
Adam Chester 🏴‍☠️
Officially diagnosed with ADHD. Racking up the ‘tism certs 🤗 Embrace Your Weird h4xx0rz!
GIF
English
12
0
58
5.5K
Max Andreacchi
Max Andreacchi@atomicchonk·
It’s important to note that there are several “gates” that need to be passed for this to work, but we need to think like most users: if the tool seems legitimate, they’ll just enable it and give it the permissions it asks for. 🤖 Vetting MCP servers should be up there with vetting any third party code being run on your system 🤖 Convenience should always be balanced with some scrutiny
English
0
0
1
69
Max Andreacchi
Max Andreacchi@atomicchonk·
What are the risks that come with adding #MCP servers? If hidden functionality exists, it could mean an attacker gaining control of your system. In my demo, the risk is obvious: I explicitly executed a shell tool that connects back to a listener on my local system. But what if that functionality were disguised as a “helpful” tool meant to make your life easier?
English
1
1
3
1.5K
Max Andreacchi retweetledi
SpecterOps
SpecterOps@SpecterOps·
Our BloodHound t-shirt fundraiser closes in 2 days! Grab your BloodHound 8.0 t-shirt, available also in kids sizes, today. All proceeds from this fundraiser will support @HopeforHIE. ➡️ ghst.ly/bh8-tshirt
SpecterOps tweet media
English
0
3
6
1.7K
Max Andreacchi
Max Andreacchi@atomicchonk·
@sh_reya Thanks for this blog post and perspective! As someone who comes from an offensive security background in traditional red teaming/pentesting, evals are one of the first things I got drawn to as I started exploring AI and safeguards. Really good write up!
English
0
0
0
113
Shreya Shankar
Shreya Shankar@sh_reya·
i did not expect to wake up this morning and write a blog post
Shreya Shankar tweet media
English
40
97
851
241K
Max Andreacchi retweetledi
SpecterOps
SpecterOps@SpecterOps·
Spoiler alert: Your AI safety measures might have a blind spot. 👀 When attackers use conversation context to bypass LLM safeguards, single-prompt evals just don't cut it anymore. Dive into @AtomicChonk's latest blog on multi-prompt attack detection. ⬇️ ghst.ly/47qJhzn
English
0
10
28
3K