Oktsec

3.5K posts

Oktsec banner
Oktsec

Oktsec

@oktsec

See everything your AI agents execute. Real-time monitoring for every tool call. One command to start. https://t.co/soCfqrQBxz

Cloud Katılım Şubat 2020
131 Takip Edilen199 Takipçiler
Oktsec retweetledi
Gus
Gus@gus_aragon·
Bounty hunting is 20% coding, 80% overhead. The fix is usually trivial. The real time sink is understanding the codebase, navigating someone else’s tech debt, setting up the environment, dealing with contribution rules, formatting the PR and handling access restrictions.
English
0
1
2
286
Oktsec retweetledi
Gus
Gus@gus_aragon·
litellm was compromised on PyPI. 97 million monthly downloads. .pth file executes on every Python startup. Exfiltrates SSH keys, cloud creds, K8s secrets. Encrypts with RSA. Creates privileged pods across your cluster. Installs systemd persistence. MCP clients like Cursor auto-download deps via uvx without version pins. That's how the discoverer got hit. Find out if you're compromised in 60 seconds with Aguara: brew install garagon/tap/aguara aguara check aguara clean Scans Python environments + uv/pip/npx caches. Shows what it found, asks confirmation, quarantines for forensics. Prevent on MCP servers: aguara scan /path/to/server/ --severity high github.com/garagon/aguara
English
2
2
3
484
Oktsec
Oktsec@oktsec·
You have MCP servers running. Claude Desktop, Cursor, VS Code, maybe a custom one. Every tool call your agent makes goes straight to the server. No scanning, no access control, no logs. Here is how to put a security layer in front of all of them. dev.to/0x711/secure-y…
English
1
0
1
61
Oktsec
Oktsec@oktsec·
Oktsec already integrates with OpenClaw. 230 detection rules scan every tool call before execution, per-agent tool policies control what each claw can access, and a tamper-evident audit trail logs everything. Works with NemoClaw via Docker Sandbox network proxy.
NVIDIA AI Developer@NVIDIAAIDev

🦞 Ready to deploy @OpenClaw? Our just released NVIDIA NemoClaw simplifies running OpenClaw always-on assistants more safely with a single command. ✅ Deploy claws more safely ✅ Run any coding agent ✅ Deploy anywhere Try with a free NVIDIA Brev Launchable: 🔗 nvda.ws/3NmMaK1

English
0
1
2
179
Oktsec retweetledi
Gus
Gus@gus_aragon·
@garrytan Thanks @garrytan! Applied for the YC Summer 2026 batch, building @oktsec around agent security. Hoping to talk more about where this is all heading. oktsec.com
English
0
1
2
60
Oktsec retweetledi
Oktsec
Oktsec@oktsec·
272,000 attacks against 13 frontier AI models. Every one broken. Gray Swan AI ran this with @OpenAI, @AnthropicAI, @Meta, and @NIST. The part that matters: attacks only counted if the agent executed the harmful action AND hid it from the user. Clean response, no alert, damage already done. 5 universal attack templates transfer across 9 models. This is not a model bug. It is structural. The paper's conclusion: "system-level and architectural defenses beyond model-level robustness training alone." oktsec.com/blog/ipi-arena…
English
0
1
3
178
Oktsec
Oktsec@oktsec·
Oktsec v0.10.0 is out. Delegation chains, LLM escalation, scan profiles, ephemeral keys, CLI hooks. From 85 rules to 188. From MCP-only to full AI agent visibility. oktsec.com/blog/v0-10-0-d…
English
0
0
2
54
Oktsec
Oktsec@oktsec·
Gambit Security published a case where an attacker used Claude (Anthropic's model) against Mexican government infrastructure. The prompts were all in Spanish, directing the model to do recon, find weaknesses, and write exfil scripts. The attacker basically used an LLM as a junior pentester. Find the vuln, write the exploit, automate the data grab. The barrier to pulling off something like this has collapsed. Real question for AI companies: are the guardrails actually working? Because this attacker apparently got enough output to compromise government systems. That should bother everyone building these models. Governments that haven't war-gamed AI-assisted attacks against their infrastructure are behind. Red teams need AI-offensive scenarios in their playbooks now, not next quarter.
Oktsec tweet media
English
0
0
0
37
Oktsec
Oktsec@oktsec·
Threat actors contact employees directly through Microsoft Teams. They pretend to be IT support or a vendor. Target sectors are finance and healthcare. The play is simple. Talk the victim into opening Quick Assist (built into Windows, Microsoft-signed) to "fix an issue." Once in, they deploy A0Backdoor. Full C2. Persistence, data theft, lateral movement. And because Quick Assist is a legit signed binary, a lot of security tools just wave it through. Fix: restrict Quick Assist via GPO. Lock down external access in Teams. Train your people (yes, again) that IT will never cold-call them on Teams asking for remote access. Monitor for unexpected remote assistance tool execution.
Oktsec tweet media
English
0
0
0
40
Oktsec
Oktsec@oktsec·
New phishing campaign via Microsoft Teams: attackers target finance and healthcare employees, use Quick Assist for remote access, then deploy the new A0Backdoor malware. Your corporate chat is an attack vector. An active campaign has been detected where attackers directly contact employees in the financial and healthcare sectors through Microsoft Teams, impersonating IT support or vendors. The attack is clever: they convince the victim to use Quick Assist (a legitimate Windows remote assistance tool) to "fix an issue." Once they have access, they deploy A0Backdoor, a new malware with full C2 capabilities. A0Backdoor enables persistence, data exfiltration, and lateral movement. By using legitimate tools like Quick Assist, it evades many security solutions that trust Microsoft-signed binaries. Protect your organization: Restrict Quick Assist via GPO. Train employees on social engineering through Teams. Implement external access policies in Teams. Monitor execution of remote access tools. #Phishing #MicrosoftTeams #Malware
English
0
0
1
66
Oktsec
Oktsec@oktsec·
While protocol-level patches are being developed, recommendations: Use a VPN on Wi-Fi networks. Implement 802.1X with certificates. Monitor for ARP/DHCP anomalies. Consider wireless network segmentation.
English
0
0
0
22
Oktsec
Oktsec@oktsec·
The severity: it affects home networks (WPA2/WPA3), office, and enterprise environments. The attack is transparent to users and conventional monitoring tools. Even WPA3 encryption doesn't fully protect against it.
English
1
0
0
13
Oktsec
Oktsec@oktsec·
New Wi-Fi attack "AirSnitch" presented at NDSS: cross-layer identity desynchronization enables full bidirectional MitM on home, office, and enterprise networks. No one is safe. #AirSnitch #WiFiSecurity #MitM #NDSS2026
Oktsec tweet media
English
1
0
0
55