Patrick Ventuzelo
@Pat_Ventuzelo
Followers
4K
Following
7K
Media
48
Statuses
5K
Founder & CEO of @FuzzingLabs | Security Researcher focused on Fuzzing & Vulnerability Research | Rust, Go, Wasm, Browser, AI, Blockchain & Web3 Security
France
Joined January 2014
Here are the slides of my talk "Beaconfuzz - A Journey into #Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery" at @offensive_con 2022. https://t.co/uORy7mb1oT
3
69
186
This runs inside the new FuzzForge v0.7.0: → Temporal workflows → On-demand vertical workers → AI-powered code analysis (SARIF included) GitHub: https://t.co/VMsW5G0wgw Docs: https://t.co/3hx0QTTZRf
#DevSecOps #AppSec #LLMSecurity #FuzzForge
github.com
AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with intelligent fuzzing, AI-driven analysis, and a marketpl...
0
9
19
Ready for #BSidesBerlin on 8 Nov? 🔥 We have talks from: @InsiderPhD , @MagisterQuis, Anshu Gupta, @kiki_morozova , Massimo Bertocchi, @malmoeb, @Krevetk0Valeriy and @Pat_Ventuzelo Don’t miss it 👇 Schedule & tickets: https://t.co/kJPlqQJlHa
@SecurityBSides
0
6
8
LLMs are beating regex in secret detection. We benchmarked Gitleaks, TruffleHog, and two LLMs on real-world codebases. GPT-5-mini hits 84.4% recall vs Gitleaks at 37.5% vs TruffleHog at 0.0% LLMs catch: – Split secrets – Obfuscated tokens – Decoded vars – Even commented-out
8
49
210
We are back at #Pwn2Own !! Excited to be part again at the most famous offensive competition in the world organized by @thezdi ;) Good luck everyone but especially for our team :p
The schedule for #Pwn2Own Ireland is now live! 53 entries from 25 teams over three days of excitement and pwnage. We'll be updating the schedule with live streaming information as we get them set up. https://t.co/wFKRtsqxjp
#P2OIreland
4
5
75
Thanks for updating attribution, that’s a necessary step. One remaining factual point must be clear for the public record: your post still states that PoCs were not copied verbatim. That is incorrect. Below is concrete evidence: the Ollama PoC we published intentionally
@fede_intern @ycombinator @paulg @FuzzingLabs Disappointed to see public accusations without reaching out first, especially after launching a competitive product. We work directly with maintainers via GitHub, not bounty platforms. Neither we nor the maintainers knew about your Huntr reports at the time, otherwise they would
4
11
104
Clustering NVIDIA DGX Spark + M3 Ultra Mac Studio for 4x faster LLM inference. DGX Spark: 128GB @ 273GB/s, 100 TFLOPS (fp16), $3,999 M3 Ultra: 256GB @ 819GB/s, 26 TFLOPS (fp16), $5,599 The DGX Spark has 3x less memory bandwidth than the M3 Ultra but 4x more FLOPS. By running
84
372
2K
#BSidesBerlin Speaker Showcase @pat_ventuzelo will deliver our closing keynote: how AI is shifting from automation to autonomy in AppSec & offensive security, envisioning AI-driven red teams. Get your tickets here 👉 https://t.co/kJPlqQJlHa
@SecurityBSides #AI #RedTeam
0
4
6
YCombinator they are taking them from other companies https://t.co/EmGGpCsoKg
Gecko’s (@gecko_sec) AI SAST scanner found 30+ zero-day vulnerabilities in major open source projects that no AppSec tool found. Here’s how they did it: https://t.co/vYObKNdLKn
1
3
21
Hi, does anyone here have a contact at @ycombinator? cc @paulg Quick context: @FuzzingLabs developed an open-source, AI-driven fuzzing tool that discovered a number of significant vulnerabilities which we disclosed publicly. A competing team backed by YC, @gecko_sec, has since
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇
21
26
260
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇
28
133
856
Our friends and partners of @piku_dao @sinankoc__ created a yieldcoin returning above 15% by investing in arbitrage strategies, carry trades, on-chain yield, and RWAs. It simplifies the access to complex strategies. I highly recommend you check what they are doing. With Lambda
The primary goal of PikuDAO is to create a stablecoin that maintains its purchasing power that also generates yield for its holders. This is achieved through a backing model that includes arbitrage strategies, carry trades, on-chain yield, and RWAs. The goal is to hedge against
8
7
21
I'm looking for companies to audit @piku_dao! We had great experience with @FuzzingLabs @LeastAuthority in @alignedlayer and now we are workign with them in @ethrex_client. We need experienced teams in DeFi and Solidity. Please reach out.
The friends and partners of @piku_dao @sinankoc__ created a yieldcoin returning above 15% by investing in arbitrage strategies, carry trades, on-chain yield, and RWAs. It simplifies the access to complex strategies. I highly recommend you check what they are doing. With Lambda
6
1
8
🚀 Big news from FuzzingLabs Academy We’re expanding our training lineup with a brand new format: Masterclasses 🎓 Short, ultra-focused sessions on cutting-edge security topics, perfect to boost your skills fast! 📅 Our Q4 2025 Course Lineup is live: - Fuzzing Windows
0
9
33
Fuzzing Labs @FuzzingLabs is creating the best open source AI Fuzzing tool to automate and find security vulnerability. I highly recommend you check what's been cooked in the Fuzz Forge repository.
8
17
47
Almost 100 ⭐️ in less than 24h! Thanks for all the support 🚀 https://t.co/VMsW5G0wgw
🚀 We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. 🔷
2
8
33
We’ve just released FuzzForge, an open-source, AI powered offensive security tool developed in collaboration with @FuzzingLabs! 🚀 🛡️FuzzForge automates vulnerability discovery using intelligent fuzzing to help you find security bugs faster and more effectively. ⭐ Give us a
5
25
54
🚀 We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. 🔷
1
21
49
FuzzingLabs and @Pat_Ventuzelo are quickly becoming global leaders in offensive security. Since I was a kid, I've been passionate about hacking, finding bugs, creating exploits, and diving deep into how systems work. Now, it’s a dream come true to be working on the frontier of
Excited to announce that our CEO @Pat_Ventuzelo is giving the Closing Keynote at #BSidesberlin 🎤 AI for AppSec and Offensive Security: From Automation to Autonomy 📅 8 Nov 2025 | 📍 CIC Berlin AI is reshaping vulnerability research, from audits & #fuzzing to autonomous red
7
5
16
Excited to announce that our CEO @Pat_Ventuzelo is giving the Closing Keynote at #BSidesberlin 🎤 AI for AppSec and Offensive Security: From Automation to Autonomy 📅 8 Nov 2025 | 📍 CIC Berlin AI is reshaping vulnerability research, from audits & #fuzzing to autonomous red
0
4
11
🔥 We’re in! Our talk “Breaking AI Inference Systems: Lessons From Pwn2Own Berlin” is officially accepted for @BlackHatEvents Europe 2025. We’ll share real-world bugs in @ollama & @nvidia Triton Server + our journey fuzzing and breaking inference platforms at @offensive_con
0
7
24