Alexandre Dulaunoy

2.7K Followers
3.4K Following
2K Posts

Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.

The other side is at @a (photography, art and free software at large)

#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable

Websitehttps://www.foo.be
GitHubhttps://github.com/adulau
Matrix@adulau:matrix.circl.lu
ORCIDhttps://orcid.org/0000-0002-5437-4652
PGP FP6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5
Other Mastodonhttps://paperbay.org/@a

We are much more excited by the idea of creating an ecosystem of forges (and different forge software) than in becoming the new one place where absolutely everything is hosted.

I am, for example, very pleased that even while switching to Forgejo, Fedora decided to keep on self-hosting rather than jumping to us.

To be clear, we’re open for everyone who needs us, especially individuals working on their own smaller projects. But other forges are our friends, not our competition

The final keynote highlight from the GÉANT #SecurityDays 2026 this April.

Alexandre Dulaunoy, Head of CIRCL, Luxembourg's national CSIRT — on how 15 years of open-source security development has shown that sharing code, knowledge and intelligence builds networks of trust between defenders.

If you haven't got your ticket yet, this week is your last chance. Secure your place before 27 March 👉 https://events.geant.org/event/1989/registrations/

📜 Scrolls volume 35 is out! Lots of good links inside as usual 😁

https://shellsharks.com/scrolls/scroll/2026-03-27

Shoutout to everyone listed below. Their work is featured/linked-to in this week’s edition. Thank you! 🙏

@merrittk @the @lwindolf @theaardvark @brennan @adulau @readbeanicecream @sindum @liztai @ernie @HughWRoberts @82mhz @joel @martindehf @anarodrigues @eclecticpassions @hyde @eli_oat @thelatestkate @Profpatsch @mrv404 @joel @kagihq @csilverman

#indieweb #fediverse #infosec #cybersecurity

Scroll trīgintā quīnque

Arcane curation from the IndieWeb, Fediverse and Cybersecurity realms

shellsharks

CRIT is trying to solve a real gap: package-oriented identifiers like CPE/PURL do not model cloud resources well, because cloud resources are runtime objects with provider-specific identifiers and exposure depends on timing, propagation, and remediation state. The draft is explicit about that, and the repo reflects it with dictionaries, schemas, samples, and a validator.

https://github.com/Vulnetix/ietf-crit-spec

They also extend the CVE record format with an x_ record just like GCVE. Yes, the ADP needs become like a major importance for the CVE Program.

CRIT records are naturally produced by parties closest to the platform semantics: cloud providers, specialized researchers, managed detection vendors, and vertical ecosystems. The draft even defines “producer” and “consumer” roles and warns that a producer aggregating multiple upstreams must handle natural-key collisions.

GCVE’s GNA model would help here because it gives each producer a stable namespace and publishing authority. That is cleaner than assuming all high-quality CRIT output ultimately needs to be mediated through the CVE pipeline or one ADP publisher. This would allow faster publication.

Potential improvements in CRIT Internet-Draft

Keep vuln_id generic, not effectively “must be CVE”.Then add:

  • aliases[]
  • issuer
  • scheme or id_namespace (cve, gcve, maybe others)

The draft already defines “vulnerability identifier” generically, even though the examples are CVEs.

Outcome

  • CRIT solves the cloud-resource modeling problem
  • GCVE solves the decentralized publication and federation problem


Discuss this on our forum.

RE: https://toad.social/@KimPerales/116296287470500816

Hope this isn't true, what guarantees are there for other EU-US collaborations that the funds won't be redirected?

https://infosec.exchange/@KimPerales@toad.social/116296287808070299

I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

#misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

@misp

🔗 Release note https://github.com/MISP/misp-modules-cli/releases/tag/v1.0
 misp-modules-cli https://github.com/MISP/misp-modules-cli
 misp-modules https://github.com/MISP/misp-modules

Release First release of misp-modules-cli - version 1.0 · MISP/misp-modules-cli

misp-modules-cli 1.0.0 We are happy to announce the long-awaited first release of misp-modules-cli version 1.0.0. This initial release makes it nifty and convenient to use MISP expansion modules di...

GitHub

Tusk on Budapest leaks to Moscow: Lithuania requested Hungary's exclusion from NATO meeting

Poland's Prime Minister Donald Tusk has said that Lithuania requested the exclusion of a Hungarian delegation from a NATO meeting as early as 2019, amid fears that it may have passed classified information to Moscow.

http://www.euronews.com/2026/03/24/tusk-on-budapest-leaks-to-moscow-lithuania-requested-hungarys-exclusion-from-nato-meeting

Tusk on Hungary's leaks to Moscow: 'Disgraceful' but 'no surprise'

Poland's Prime Minister Donald Tusk has said that Lithuania requested the exclusion of a Hungarian delegation from a NATO meeting as early as 2019, amid fears that it may have passed classified information to Moscow.

euronews

@adulau 👍 I've been getting a lot of value out of PyVulnerabilityLookup, VLAI, and sightings for semi-automated vulnerability assessment and prioritization, as well as to support the monthly CTI report our team puts out covering the most notable vulnerabilities of the month.

With VulnMCP, I'll likely be able to centralize everything, connect Claude directly, and stop hammering the Vulnerability-Lookup API with requests from my overly eager and somewhat scattered agents 😄
I'd love to give back to the project but don't feel confident enough on the dev side to contribute that way. Hopefully I'll find another way eventually.

Thanks for everything you do for the community.

VulnMCP is an MCP server built with FastMCP that provides AI clients, chat agents, and other automated systems with tools for vulnerability management. It offers modular "skills" that can be easily extended or integrated, enabling intelligent analysis and automated insights on software vulnerabilities.

A new component in the galaxy of tooling of vulnerability-lookup.

Thanks to @cedric who is becoming an orchestrator for many AI tools nowadays.

#cve #gcve #vulnerability #vulnerabilitymanagement #opensource #ai #mcp #vulnerabilitylookup

🔗 https://github.com/vulnerability-lookup/VulnMCP

GitHub - vulnerability-lookup/VulnMCP: A modular MCP providing AI-driven vulnerability management skills, including severity classification and automated insights.

A modular MCP providing AI-driven vulnerability management skills, including severity classification and automated insights. - vulnerability-lookup/VulnMCP

GitHub

Before submitting one or more talks to @passthesaltcon 2026, I wrote a blog post based on my 2024 presentation: Bring Back RSS for Operational Security.

#rss #infosec #cybersecurity #cti #threatintel #osint #opensource #atom

https://www.foo.be/2026/03/bring-back-rss

Bring Back RSS for Operational Security

Personal webpage of Alexandre Dulaunoy - from information security to open source and art

Alexandre Dulaunoy - adulau - Home Page