Pat_Ventuzelo Profile Banner
Patrick Ventuzelo Profile
Patrick Ventuzelo

@Pat_Ventuzelo

Followers
4K
Following
7K
Media
48
Statuses
5K

Founder & CEO of @FuzzingLabs | Security Researcher focused on Fuzzing & Vulnerability Research | Rust, Go, Wasm, Browser, AI, Blockchain & Web3 Security

France
Joined January 2014
Don't wanna be here? Send us removal request.
@Pat_Ventuzelo
Patrick Ventuzelo
4 years
Here are the slides of my talk "Beaconfuzz - A Journey into #Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery" at @offensive_con 2022. https://t.co/uORy7mb1oT
3
69
186
@SidesBer
BSides Berlin
4 days
Ready for #BSidesBerlin on 8 Nov? 🔥 We have talks from: @InsiderPhD , @MagisterQuis, Anshu Gupta, @kiki_morozova , Massimo Bertocchi, @malmoeb, @Krevetk0Valeriy and @Pat_Ventuzelo Don’t miss it 👇 Schedule & tickets: https://t.co/kJPlqQJlHa @SecurityBSides
0
6
8
@FuzzingLabs
FuzzingLabs
5 days
LLMs are beating regex in secret detection. We benchmarked Gitleaks, TruffleHog, and two LLMs on real-world codebases. GPT-5-mini hits 84.4% recall vs Gitleaks at 37.5% vs TruffleHog at 0.0% LLMs catch: – Split secrets – Obfuscated tokens – Decoded vars – Even commented-out
8
49
210
@FuzzingLabs
FuzzingLabs
5 days
We are back at #Pwn2Own !! Excited to be part again at the most famous offensive competition in the world organized by @thezdi ;) Good luck everyone but especially for our team :p
@thezdi
Trend Zero Day Initiative
6 days
The schedule for #Pwn2Own Ireland is now live! 53 entries from 25 teams over three days of excitement and pwnage. We'll be updating the schedule with live streaming information as we get them set up. https://t.co/wFKRtsqxjp #P2OIreland
4
5
75
@FuzzingLabs
FuzzingLabs
10 days
Thanks for updating attribution, that’s a necessary step. One remaining factual point must be clear for the public record: your post still states that PoCs were not copied verbatim. That is incorrect. Below is concrete evidence: the Ollama PoC we published intentionally
@gecko_sec
Gecko Security
12 days
@fede_intern @ycombinator @paulg @FuzzingLabs Disappointed to see public accusations without reaching out first, especially after launching a competitive product. We work directly with maintainers via GitHub, not bounty platforms. Neither we nor the maintainers knew about your Huntr reports at the time, otherwise they would
4
11
104
@exolabs
EXO Labs
10 days
Clustering NVIDIA DGX Spark + M3 Ultra Mac Studio for 4x faster LLM inference. DGX Spark: 128GB @ 273GB/s, 100 TFLOPS (fp16), $3,999 M3 Ultra: 256GB @ 819GB/s, 26 TFLOPS (fp16), $5,599 The DGX Spark has 3x less memory bandwidth than the M3 Ultra but 4x more FLOPS. By running
84
372
2K
@SidesBer
BSides Berlin
12 days
#BSidesBerlin Speaker Showcase @pat_ventuzelo will deliver our closing keynote: how AI is shifting from automation to autonomy in AppSec & offensive security, envisioning AI-driven red teams. Get your tickets here 👉 https://t.co/kJPlqQJlHa @SecurityBSides #AI #RedTeam
0
4
6
@fede_intern
Fede’s intern 🥊
13 days
YCombinator they are taking them from other companies https://t.co/EmGGpCsoKg
@ycombinator
Y Combinator
3 months
Gecko’s (@gecko_sec) AI SAST scanner found 30+ zero-day vulnerabilities in major open source projects that no AppSec tool found. Here’s how they did it: https://t.co/vYObKNdLKn
1
3
21
@fede_intern
Fede’s intern 🥊
13 days
Hi, does anyone here have a contact at @ycombinator? cc @paulg Quick context: @FuzzingLabs developed an open-source, AI-driven fuzzing tool that discovered a number of significant vulnerabilities which we disclosed publicly. A competing team backed by YC, @gecko_sec, has since
@FuzzingLabs
FuzzingLabs
13 days
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇
21
26
260
@FuzzingLabs
FuzzingLabs
13 days
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇
28
133
856
@fede_intern
Fede’s intern 🥊
16 days
Our friends and partners of @piku_dao @sinankoc__ created a yieldcoin returning above 15% by investing in arbitrage strategies, carry trades, on-chain yield, and RWAs. It simplifies the access to complex strategies. I highly recommend you check what they are doing. With Lambda
@piku_dao
Piku
16 days
The primary goal of PikuDAO is to create a stablecoin that maintains its purchasing power that also generates yield for its holders. This is achieved through a backing model that includes arbitrage strategies, carry trades, on-chain yield, and RWAs. The goal is to hedge against
8
7
21
@fede_intern
Fede’s intern 🥊
16 days
I'm looking for companies to audit @piku_dao! We had great experience with @FuzzingLabs @LeastAuthority in @alignedlayer and now we are workign with them in @ethrex_client. We need experienced teams in DeFi and Solidity. Please reach out.
@fede_intern
Fede’s intern 🥊
16 days
The friends and partners of @piku_dao @sinankoc__ created a yieldcoin returning above 15% by investing in arbitrage strategies, carry trades, on-chain yield, and RWAs. It simplifies the access to complex strategies. I highly recommend you check what they are doing. With Lambda
6
1
8
@FuzzingLabs
FuzzingLabs
17 days
🚀 Big news from FuzzingLabs Academy We’re expanding our training lineup with a brand new format: Masterclasses 🎓 Short, ultra-focused sessions on cutting-edge security topics, perfect to boost your skills fast! 📅 Our Q4 2025 Course Lineup is live: - Fuzzing Windows
0
9
33
@fede_intern
Fede’s intern 🥊
17 days
Fuzzing Labs @FuzzingLabs is creating the best open source AI Fuzzing tool to automate and find security vulnerability. I highly recommend you check what's been cooked in the Fuzz Forge repository.
8
17
47
@FuzzingLabs
FuzzingLabs
25 days
Almost 100 ⭐️ in less than 24h! Thanks for all the support 🚀 https://t.co/VMsW5G0wgw
@FuzzingLabs
FuzzingLabs
26 days
🚀 We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. 🔷
2
8
33
@fede_intern
Fede’s intern 🥊
25 days
We’ve just released FuzzForge, an open-source, AI powered offensive security tool developed in collaboration with @FuzzingLabs! 🚀 🛡️FuzzForge automates vulnerability discovery using intelligent fuzzing to help you find security bugs faster and more effectively. ⭐ Give us a
5
25
54
@FuzzingLabs
FuzzingLabs
26 days
🚀 We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. 🔷
1
21
49
@fede_intern
Fede’s intern 🥊
1 month
FuzzingLabs and @Pat_Ventuzelo are quickly becoming global leaders in offensive security. Since I was a kid, I've been passionate about hacking, finding bugs, creating exploits, and diving deep into how systems work. Now, it’s a dream come true to be working on the frontier of
@FuzzingLabs
FuzzingLabs
1 month
Excited to announce that our CEO @Pat_Ventuzelo is giving the Closing Keynote at #BSidesberlin 🎤 AI for AppSec and Offensive Security: From Automation to Autonomy 📅 8 Nov 2025 | 📍 CIC Berlin AI is reshaping vulnerability research, from audits & #fuzzing to autonomous red
7
5
16
@FuzzingLabs
FuzzingLabs
1 month
Excited to announce that our CEO @Pat_Ventuzelo is giving the Closing Keynote at #BSidesberlin 🎤 AI for AppSec and Offensive Security: From Automation to Autonomy 📅 8 Nov 2025 | 📍 CIC Berlin AI is reshaping vulnerability research, from audits & #fuzzing to autonomous red
0
4
11
@FuzzingLabs
FuzzingLabs
1 month
🔥 We’re in! Our talk “Breaking AI Inference Systems: Lessons From Pwn2Own Berlin” is officially accepted for @BlackHatEvents Europe 2025. We’ll share real-world bugs in @ollama & @nvidia Triton Server + our journey fuzzing and breaking inference platforms at @offensive_con
0
7
24