Aloïs Thévenot 

191 Followers
298 Following
586 Posts
Jack of all trades, master of some. CTO / Pentester
Bloghttps://www.techbrunch.fr/blog/
Twitterhttps://twitter.com/TechBrunchFR
Rails Security, AI, and IBB

For quite a few years the Rails project has been working with the Internet Bug Bounty (IBB). The IBB is an organization that awarded cash to security researchers that reported issues to OSS projects participating in the IBB. For quite a while I wasn’t certain about my feelings toward the program because I felt like cash rewards could incentivize low quality reports as well as encourage reporters to “haggle” about the severity of a particular bug (the IBB paid more when the bug was more severe). In the beginning that certainly was the case. We were fielding many low quality reports, and people were haggling over severity. But the program evolved, and despite the never-ending haggling, I felt it did more good (rewarding security researchers) than bad (forcing the security team to wade through low quality reports).

Tenderlove Making

"If anything, if the cost of a line of code has dramatically dropped, then the cost of the right line of code has dramatically increased."

"You don't have to be productive at all times. Earning experience is more valuable than completing something instantaneously."

Food for thoughts - https://www.youtube.com/watch?v=V-ZvAw_VNk4

"I suck" -ThePrimeagen

YouTube

Can you trust the trust dialog?

We discovered that running Claude Code in malicious folders could have executed system commands before the trust dialog even appears! Learn about the details in our latest blog post:

https://www.sonarsource.com/blog/claude-arbitrary-code-execution?utm_medium=social&utm_source=mastodon&utm_campaign=research&utm_content=social-claude-code-exec-260430-&utm_term=---&s_category=Organic&s_source=Social%20Media&s_origin=social

#appsec #security #vulnerability

Arbitrary code execution and Claude Code CLI: How Claude executed code before you click 'trust'

We discovered different ways an untrusted folder can execute arbitrary code in Claude Code before the user is prompted with the trust dialog, allowing for potential compromise when cloning untrusted projects!

We've launched a new free Web Security Academy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains!

Dive in here: https://portswigger.net/web-security/llm-attacks/ai-powered-scanner-vulnerabilities

The zero-days are numbered  | The Mozilla Blog

Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser.

Fortinet remains the #1 targeted perimeter vendor:

• CVE-2026-35616 auth bypass: 1,535,690 sessions
• SSL VPN brute-force: 116,753 sessions (trending ↑)
• CISA KEV since April 6

See it on GreyNoise → https://www.greynoise.io/resources/at-the-edge-clear-041326

At The Edge Clear: April 06 - 13, 2026

This week's intelligence highlights a shift from opportunistic scanning to coordinated, targeted exploitation of enterprise perimeter devices and IoT infrastructure, with adversaries operationalizing prior reconnaissance at scale.

I had to reset my phone and didn't know that iCloud did not include a Signal backup... Oh well, live and learn.

Ludus 2 (@badsectorlabs), new GOAD lab (@M4yFly), 🍪 hack (@XeEaton), DPAPI + Nemesis (@harmj0y + @tifkin_), iOS exploit kit found (@Mandiant), and more!

https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-03-09.html

Last Week in Security (LWiS) - 2026-03-09

Ludus 2 (@badsectorlabs), new GOAD lab (@M4yFly), 🍪 hack (@XeEaton), DPAPI + Nemesis (@harmj0y + @tifkin_), iOS exploit kit found (@Mandiant), and more!

Bad Sector Labs Blog

There's a lot of discourse on Twitter about people using LLMs to solve CTF challenges. I used to write CTF challenges in a past life, so I threw a couple of my hardest ones at it.

We're screwed.

At least with text-file style challenges ("source code provided" etc), Claude Opus solves them quickly. For the "simpler" of the two, it just very quickly ran through the steps to solve it. For the more "ridiculous" challenge, it took a long while, and in fact as I type this it's still burning tokens "verifying" the flag even though it very obviously found the flag and it knows it (it's leetspeak and it identified that and that it's plausible). LLMs are, indeed, still completely unintelligent, because no human would waste time verifying a flag and second-guessing itself when it very obviously is correct. (Also you could just run it...)

But that doesn't matter, because it found it.

The thing is, CTF challenges aren't about inventing the next great invention or having a rare spark of genius. CTF challenges are about learning things by doing. You're supposed to enjoy the process. The whole point of a well-designed CTF challenge is that anyone, given enough time and effort and self-improvement and learning, can solve it. The goal isn't actually to get the flag, otherwise you'd just ask another team for the flag (which is against the rules of course). The goal is to get the flag by yourself. If you ask an LLM to get the flag for you, you aren't doing that.

(Continued)

Datadog 🤝 Okta: "The enhanced logic developed by Datadog’s own Security Research team during this collaboration has been contributed back to the public Okta Security Detection Catalog, ensuring that the broader security community benefits from this joint research regardless of their tooling"

Read more here: https://sec.okta.com/articles/2026/03/datadog-okta-collaboration/

Datadog and Okta Combine for New Customer Detections

The Okta security team's goal is to provide practical web security tools, solutions, and education to help make all applications safer. Read our security research and find our Github projects.

Okta, Inc.