
Max Andreacchi
20 posts

Max Andreacchi
@atomicchonk
AI Security Researcher and Red Teamer at SpecterOps | Corgi Dad
United States Katılım Eylül 2025
135 Takip Edilen28 Takipçiler


@AnthropicAI dropped Dispatch today, allowing you to control @claudeai workflows on your computer from your phone. 1/x
support.claude.com/en/articles/13…
English

Absolutely loved doing this research and I’m beyond excited to share it with you all! You never know what’ll shake out if you try to “con the bot” 🤖 #ai #cyber
SpecterOps@SpecterOps
AI models are trained to agree with you. What if that’s the vulnerability? @atomicchonk explored Claude’s sycophancy and uncovered signs of a dual-agent architecture, including a stateless secondary instance. Check it out! ⤵️ ghst.ly/4qWu3Ic
English

@atomicchonk It’s such a weird experience, not sure I’m ready for this power 🤣🤣
English
Max Andreacchi retweetledi

Blogs are up!

SpecterOps@SpecterOps
Wanting more from today's #BHEU talk on SCOM? Check out this two part blog series! 1️⃣ @unsigned_sh0rt maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. ghst.ly/3MBPeAW 🧵: 1/2
English
Max Andreacchi retweetledi

Stack spoofing isn’t dead.
Hear from @klezvirus at #BHEU on how modern detection still breaks, and unveils the first CET-compliant stack spoofing framework.
Learn more ➡️ ghst.ly/4izmuou

English
Max Andreacchi retweetledi
Max Andreacchi retweetledi

SCOM monitors critical systems, but insecure defaults make it a powerful attack vector.
At #BHEU, @unsigned_sh0rt & @breakfix show how to abuse SCOM for credential theft, lateral movement, and domain escalation, plus how to defend it. ghst.ly/4aoggph

English

Happy Veterans Day (taken on a flight home this evening from DC) #veteran #WashingtonDC #veteransday #USA #america

English

It’s important to note that there are several “gates” that need to be passed for this to work, but we need to think like most users: if the tool seems legitimate, they’ll just enable it and give it the permissions it asks for.
🤖 Vetting MCP servers should be up there with vetting any third party code being run on your system
🤖 Convenience should always be balanced with some scrutiny
English

What are the risks that come with adding #MCP servers?
If hidden functionality exists, it could mean an attacker gaining control of your system.
In my demo, the risk is obvious: I explicitly executed a shell tool that connects back to a listener on my local system. But what if that functionality were disguised as a “helpful” tool meant to make your life easier?
English
Max Andreacchi retweetledi

Our BloodHound t-shirt fundraiser closes in 2 days! Grab your BloodHound 8.0 t-shirt, available also in kids sizes, today. All proceeds from this fundraiser will support @HopeforHIE.
➡️ ghst.ly/bh8-tshirt

English

@sh_reya Thanks for this blog post and perspective! As someone who comes from an offensive security background in traditional red teaming/pentesting, evals are one of the first things I got drawn to as I started exploring AI and safeguards. Really good write up!
English
Max Andreacchi retweetledi

Spoiler alert: Your AI safety measures might have a blind spot. 👀
When attackers use conversation context to bypass LLM safeguards, single-prompt evals just don't cut it anymore.
Dive into @AtomicChonk's latest blog on multi-prompt attack detection. ⬇️ ghst.ly/47qJhzn
English




