Teri Radichel

1.2K Followers
66 Following
1.8K Posts
CEO, 2nd Sight Lab. Pentesting, Security Research. GSE 240. GSE . AWS Security Hero . Author: Cybersecurity for Executives in the Age of Cloud. Former: SANS Instructor, IANS Research

What I've Vibe Coded 🤖 In 2.5 Weeks ~ Compared to similar code I tried to implement for years to deploy an AWS environment for running batch jobs (as AI agents or not). How I did it.

https://teriradichel.substack.com/p/what-ive-vibe-coded-in-25-weeks

What I've Vibe Coded In 2.5 Weeks

Compared to similar code I tried to implement for years...

Teri Radichel :: Security and Technology Research

RE: https://infosec.exchange/@teriradichel/116262937287288024

If you are using AI agents and don’t understand this, better read up.

Where are the Private Bits of FIDO2 Compliant Passkey Stored?

Just because you’re vibe coding doesn’t mean you no longer need to understand how things work. Research for my tool to start a batch job with a Yubikey.

https://teriradichel.substack.com/p/where-are-the-private-bits-of-fido2

Where are the Private Bits of FIDO2 Compliant Passkey Xtored?

On a Yubikey, computer, phone, Google Password Manager? It depends...how did you register it?

Teri Radichel :: Security and Technology Research

All the complicated stuff I do with AI starts here. I still use this method with a few tweaks. Instead of writing a book I publish here. Learn to write good code with AI ~ and secure it.

Implement A Simple Project With Kiro CLI and a READ

https://teriradichel.substack.com/p/implement-a-simple-project-with-kiro

Implement A Simple Project With Kiro CLI and a README.md

How to implement a simple program consisting of bash scripts in an uncomplicated manner with Kiro CLI and a README.md file

Teri Radichel :: Security and Technology Research

Finally!

AWS Security Hub is expanding to unify security operations across multicloud environments

https://aws.amazon.com/blogs/security/aws-security-hub-is-expanding-to-unify-security-operations-across-multicloud-environments/

AWS Security Hub is expanding to unify security operations across multicloud environments | Amazon Web Services

After talking with many customers, one thing is clear: the security challenge has not gotten easier. Enterprises today operate across a complex mix of environments, including on-premises infrastructure, private data centers, and multiple clouds, often with tools that were never designed to work together. The result is enterprise security teams spend more time managing tools […]

Amazon Web Services

I’m in shock. For the AI 🤖 doubters here’s where I’m at after like three weeks I think. To be fair been working long hours but still.

I spent days in between resolving a lot of other resource issues and blog posts creating a script that creates the default VPC configuration for all the accounts in my organization environments.

An environment is basically an ou with a bunch of standard accounts and resources in it where compute resources and users can access them but not other environments. Like an Azure subscription or GCP project kind of. Standardized deployments, controls, governance, trust boundaries, and in the end -agent (true) sandboxes. More on that later.

The complicated part was the ui - i create a default VPC configuration and using bash allow the user to add, edit, delete each resource.

In the end the VPC configuration is stored to an XML file - one for each VPC, including in which regions to deploy the VPC.

I had Kiro CLI with Opus 4.6 write a Lambda function that deploys everything in the XML file.

Opus seems to be behaving ok again in AWS Kiro, BTW.

As for all the things in my VPCs…

It’s a lot. I listed the resources in prior posts so not going to repeat.

When I ran the Lambda, the biggest issue I had was adjusting key policies and lambda role policies and making sure variable were set and populated with consistent names and values.

When I ran the lambda function it deployed everything up to a VPC endpoint missing a security group. It failed to fix it right the first time.

After that one issue - it deployed everything without error. So like three tries to deploy a super complex networking environment.

I literally thought I would run it a couple of times and troubleshoot tomorrow because it was going to take way too long.

Wow cool. 😎

I hit another KMS bucket policy issue in one account. Why I don’t know they should be all the same.

Beyond that I can start reviewing all the resources tomorrow for any errors and begin testing my Yubikey button push to run a job functionality which is deployed but untested.

Woot! 🎉

After I wrote this I’m seriously doubting it actually worked. It deployed too fast. I did tell it to deploy in parallel. Will Check tomorrow.

The technical "problem" depends on whether you view security through the lens of mathematical purity or practical risk. Both sides have valid technical arguments, but they are talking past each other.
1. The Nonce-Reuse Bug (hpke-rs)

* The Flaw: As discussed, the AES-GCM nonce counter in hpke-rs can wrap around after $2^{32}$ operations.
* Is it a "Problem"?
* Technically: Yes. In cryptography, reusing a nonce with AES-GCM is a "catastrophic" failure that allows an attacker to decrypt traffic and forge messages.
* Practically: Unlikely. For a typical application, performing 4.2 billion encryptions on a single session key is rare. Most high-security protocols (like TLS or Signal) re-key far earlier.
* The Fix: Cryspen patched this by adding a check to ensure the counter never overflows. [1, 2, 3, 4]

2. The DoS/Panic Bug (libcrux-psq)

* The Flaw: A specific malformed AES-GCM ciphertext could trigger a panic! in libcrux-psq during decryption.
* Is it a "Problem"?
* Technically: Yes. This was formally issued as [RUSTSEC-2026-0025](https://rustsec.org/advisories/RUSTSEC-2026-0025) with a CVSS score of 8.2 (High).
* Practically: Yes. A remote attacker could crash a server by simply sending a "poison" packet.
* The Fix: The vulnerability was addressed in libcrux PR #1319. [5]

3. The "Unverified Fallback" (libcrux-intrinsics)

* The Flaw: On certain ARM platforms, an "unverified fallback" code path produced incorrect SHA-3 results, leading to invalid digital signatures.
* Is it a "Problem"?
* Technically: Yes. It was issued as RUSTSEC-2025-0133.
* Practically: Moderate. It causes "functional failure" (the crypto just doesn't work), which is a major issue for a library marketing itself as "formally verified". [6, 7, 8, 9, 10]

Summary Assessment

| Feature | Kobeissi's View (Researcher) | Maintainers' View (Developer) |
|---|---|---|
| Severity | Critical: Any crypto break is a failure. | Low/Moderate: These are edge cases or pre-release bugs. |
| Disclosure | Mandatory: Use cargo audit to alert everyone. | Discretionary: Fix silently if the risk is low to avoid "noise." |
| Verification | Failed: The "verified" claim is misleading. | Working: Verification is a process; bugs are found in unverified shims. |

The verdict: These are legitimate technical bugs. The "war of words" is not about whether the bugs exist, but about communication. Kobeissi is right that users deserve advisories for breaking crypto; the maintainers are right that his approach was perceived as inflammatory for low-probability risks.
Would you like to see the specific code diff for the nonce-reuse fix to see how they implemented the counter check?

[1] [https://www.theregister.com](https://www.theregister.com/2026/03/20/cryptographer_nadim_kobeissi_rustsec_ban/?td=keepreading#:~:text=Not%20everyone%20agrees%20with%20that%20assessment.%20Cryptographer,what%20in%20my%20opinion%20was%20unobjectionable%20behavior.%22)
[2] [https://rustsec.org](https://rustsec.org/advisories/RUSTSEC-2025-0009.html)
[3] [https://github.com](https://github.com/advisories/GHSA-g433-pq76-6cmf#:~:text=Description.%20We%20publish%20a%20GitHub%20security%20advisory,and%20hpke%2Drs%2Drust%2Dcrypto%20crates%20contain%20the%20following%20bug%2Dfixes:)
[4] [https://github.com](https://github.com/cryspen/hpke-rs#:~:text=An%20implementation%20of%20HPKE%20%28RFC%209180%29%20with,authenticate%20possession%20of%20a%20KEM%20private%20key.)
[5] [https://rustsec.org](https://rustsec.org/advisories/RUSTSEC-2026-0025)
[6] [https://lobste.rs](https://lobste.rs/s/vhvbr8/on_promises_high_assurance_cryptography#:~:text=On%20platforms%20without%20the%20core::arch::aarch64::vxarq_u64%20intrinsic%2C%20an,yielding%20incorrect%20shared%20secrets%20and%20invalid%20signatures.)
[7] [https://rustsec.org](https://rustsec.org/categories/crypto-failure.html)
[8] [https://rustsec.org](https://rustsec.org/categories/crypto-failure.html)
[9] [https://github.com](https://github.com/cryspen/libcrux)
[10] [https://crates.io](https://crates.io/crates/libcrux)

RUSTSEC-2026-0025: libcrux-psq: Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext › RustSec Advisory Database

Security advisory database for Rust crates published through https://crates.io

Cryptographer fights RustSec ban over bug reports • The Register ~ What’s your take? Critical or not?

https://www.theregister.com/2026/03/20/cryptographer_nadim_kobeissi_rustsec_ban/

Cryptographers engage in war of words over RustSec bug reports and subsequent ban

: Rust security maintainers contend Nadim Kobeissi's vulnerability claims are too much

The Register
I know it’s only round one, but…how are your brackets doing? I missed a few the first day and thought I was going to do way worse than last year but had a comeback tonight. 🏀

AI Agent DNS Leaks 🤖
Is this really a bug? Or is it functionality abuse? Because this is how the internet works. You decide. In any case be aware...

https://teriradichel.substack.com/p/ai-model-dns-leaks

AI Model DNS Leaks

Is this really a bug? Or is it functionality abuse? Because this is how the internet works. You decide. In any case be aware...

Teri Radichel :: Security and Technology Research