vulns-ai/OpenBSD_zoneinfo_unveil_sandbox_escape/OpenBSD_Zoneinfo_Sandbox_Escape.txt at main · ortegaalfredo/vulns-ai

Vulnerabilities advisories and PoC. Contribute to ortegaalfredo/vulns-ai development by creating an account on GitHub.

GitHub
Over 400 businesses sign pledge to help keep Whitecaps in Vancouver
The campaign, which launched 10 days ago, asks businesses to join in "the private sector's commitment to helping the club bridge its current revenue gap" through sponsorships, partnerships, and group ticket programs.
https://www.cbc.ca/news/canada/british-columbia/vancouver-whitecaps-business-pledge-9.7198552?cmp=rss
Over 400 businesses sign pledge to help keep Whitecaps in Vancouver
The campaign, which launched 10 days ago, asks businesses to join in "the private sector's commitment to helping the club bridge its current revenue gap" through sponsorships, partnerships, and group ticket programs.
https://www.cbc.ca/news/canada/british-columbia/vancouver-whitecaps-business-pledge-9.7198552?cmp=rss
DIGEST: THE UNIFIED HOSTAGE–PLEDGE FIELD

DIGEST: THE UNIFIED HOSTAGE–PLEDGE FIELD A High‑Level Overview of the System That Shapes Thought, Relationship, Identity, and Survival The Hostage–Pledge OS is a single relational–epistemic operati…

Ever Wonder Why?

Before power became a palace, a crown, or a government, it was something much simpler and far more durable:
a body held as collateral. #pledge #captive

https://survivorliteracy.com/2026/04/30/post-2-the-hostage-logic-power-before-the-throne-2/

Post 2 — The Hostage Logic: Power Before the Throne

Post 2 — The Hostage Logic: Power Before the Throne Before power became a palace, a crown, or a government, it was something much simpler and far more durable:a body held as collateral. Long before…

Survivor Literacy
Built an AI agent harness on OpenBSD 7.8, as a test and - because why not(?)
It's 198 agents. 198 UNIX users. One kernel.

Each job runs through a setuid C wrapper:
chroot(2) → unveil(2) → pledge(2) → execve(2)
PF handles per-department egress. Every syscall is logged.

Idle agents cost zero RAM. They're just directory entries until the executor calls them up. No containers. No VMs. No orchestrator bloat.
Just OpenBSD being exactly what it was built to be. ❤️

More people should know this OS is the ultimate AI harness. 🐡

#OpenBSD #pledge #unveil #pf #BSD #AI #agenticAI
Federal government targets sport participation with $660 million pledge to sport organizations
The federal government is targeting participation in sport with $660 million pledged to national sport organizations over five years. That comes after a commission studying the future of sport in Canada found a "widespread funding crisis" has made sport unsafe.
https://www.cbc.ca/sports/government-budget-update-2026-sports-funding-9.7180540?cmp=rss
Federal government targets sport participation with $660 million pledge to sport organizations
The federal government is targeting participation in sport with $660 million pledged to national sport organizations over five years. That comes after a commission studying the future of sport in Canada found a "widespread funding crisis" has made sport unsafe.
https://www.cbc.ca/sports/government-budget-update-2026-sports-funding-9.7180540?cmp=rss
Hostage–Pledge System – How 70 Logical Fallacies + Relational Distortions Sustain a Self‑Maintaining Control Structure

How 70 Logical Fallacies + Relational Distortions Sustain a Self‑Maintaining Control Structure Safety is conditional, and the only way to avoid being the hostage is to pledge someone else. The Host…

Survivor Literacy
Symbolic links bite again! This time it's #NixOS did you know #sydbox has trace/force_no_symlinks and trace/force_no_magiclinks options to disable following symlinks/magiclinks? You can even change them at runtime to achieve #pledge like confinement: https://discourse.nixos.org/t/nix-security-advisory-privilege-escalation-via-symlink-following-during-fod-output-registration/76900 #nix #linux #security
Nix security advisory: Privilege escalation via symlink following during FOD output registration

Summary Nix daemon is vulnerable to arbitrary file overwrites as the daemon user (root on NixOS and in multi-user installations). The issue is identified as GHSA-g3g9-5vj6-r3gj with CVE assignment pending. All users allowed to submit builds to the Nix daemon (allowed-users, everyone by default) can achieve arbitrary file writes as root and subsequent privilege escalation. Am I affected? All Nix versions since 2.21 and patch releases >=2.18.2,>=2.19.4,>=2.20.5 prior to 2.34.5, 2.33.4, 2.32.7, 2...

NixOS Discourse