2K Followers
1.5K Following
240 Posts
Kampai!
Sleep not found
Kinda cool that the Artemis landing parachutes were sponsored by Tunnocks 😉🤷‍♂️

Is anyone else being sick of vendors dismissing clear reports of security issues as “Intended Behaviour”/“By Design” and “not a security issue“?

I’ve even had two claim it’s “theoretical” or “not reproducible” despite screenshots and syntax for a POC tool and advice that there is a private repo for the exploit tool they can be added do.

Lazy triage?

This isn’t aimed at a single vendor. A friend and I have reported one to 4 major vendors who are all vulnerable to the same issue and attack vector and the response from 3/4 so far is as above. Which means that then the other vendor presumably responds in the same way, we will end up disclosing because if we don’t, someone with less scruples/morals will find it and use it anyway - if in fact it has not already been widely used because it’s incredibly simple to do and to deceive defences that just aren’t looking at this attack before at all.

Just Tokyo things
Konnichiwa!
Umm… how?!

Yesterday I saw that Anthropic had (accidentally) leaked Claude Code source via a source map in an npm package.

There’s already debate about whether it was “really” a leak or if the code was effectively public anyway.

I wasn’t that interested in the discourse.

I was interested in the source.

Specifically:
• What it tells us about AI agent plumbing (the harness)
• And what that means for security - beyond prompt injection and model-centric thinking

So I pulled it apart.

The result ended up being… longer than expected 😅
So I split it into a 3-part series.

Part 1 is here:
https://cirriustech.co.uk/blog/agent-harness-abuse-part-1/

If you know me, it won’t surprise you:
This is very much about identity, trust boundaries, and systems thinking.

None of this is new.

But it is increasingly relevant as agent runtimes become distributed systems in their own right.

Curious what others think - especially if you’ve looked at similar architectures

The Model Isn't the Risk. The Harness Is (Part 1): The Leak, the Context, and the Framework

Part 1 of 3. The Anthropic Claude Code source map leak — why the real story isn't the secrets that weren't there, it's the architecture that was. Introducing the three-phase methodology and what Phase 1 Recon revealed.

CirriusTech | Serious About Tech

OID-See v1.1.0 is live.

This one’s a bit different - it shifts from scoring signals in isolation to looking at when those signals actually matter.

Permissions, publishers, reachability... none of them are inherently risky on their own.
Risk shows up when they intersect with tenant posture.

So instead of:
“this looks risky”

You get:
“this becomes risky under these conditions”

Less noise. More context. More defensible output.

Also a big shoutout to my first external contributor Suryendu Bhattacharyya for adding new auth methods - much easier to just run it now 🙌

Release + write-up: https://cirriustech.co.uk/blog/oid-see-v1.1.0/

OID-See v1.1.0: External Identity Posture, iOS Support, and New Auth Methods

OID-See v1.1.0 adds JWT parsing and external identity posture, a universal graph view with iOS support, eight cross-tenant filter presets, new scanner authentication methods, and a fully Web Worker-backed architecture.

CirriusTech | Serious About Tech