Rory McNamara Profile
Rory McNamara

@PsychoMario

Followers
471
Following
30
Media
2
Statuses
57

Staff Security Researcher @snyksec

Joined August 2010
Don't wanna be here? Send us removal request.
@PsychoMario
Rory McNamara
3 months
I had a play with some vector databases and identified a new(?) method for persistent prompt injection. Read about it here:
@snyksec
Snyk
3 months
🚨 New threat: Persistent prompt injection with poisoned vector databases! Discover how “RAGPoison” exposes this risk and learn how to protect your LLMs. Read more: https://t.co/D5icj6zpOF #RAGPoison #PromptInjection #Cybersecurity
0
0
0
@snyksec
Snyk
3 months
🚨 New threat: Persistent prompt injection with poisoned vector databases! Discover how “RAGPoison” exposes this risk and learn how to protect your LLMs. Read more: https://t.co/D5icj6zpOF #RAGPoison #PromptInjection #Cybersecurity
labs.snyk.io
Explore RAGPoison, a novel prompt injection technique that exploits poisoned vector databases in LLM systems. Learn how it works and discover essential mitigations to protect your AI applications.
1
2
6
@liran_tal
Liran Tal
3 months
/1 🚨 mega-thread on exploiting MCP servers via prompt injection, buckle up 👇
5
26
77
@snyksec
Snyk
3 months
Major credit to the NixOS, Lix, and Guix teams for their incredibly fast response and for issuing patches to fix the issues. Want to see the full exploit chain, from file descriptor exfiltration to root shell? Read the full technical deep dive on our blog:
labs.snyk.io
Discover a privilege escalation chain in NixOS & Snyk Labs combined multiple vulnerabilities, including race conditions, to achieve full root access on a stock system.
0
2
2
@snyksec
Snyk
3 months
With arbitrary directory deletion, we targeted /tmp to race another Nix build process. This second race allowed us to hijack a chown call, letting us change the ownership of any file on the system to a user we controlled. The target? /etc/pam.d.
1
1
1
@snyksec
Snyk
3 months
This foothold allowed us to create a classic Time-of-Check, Time-of-Use (TOCTOU) race condition. By modifying a directory while the garbage collector was running, we could trick a privileged Nix process into emptying any directory on the system.
1
1
0
@snyksec
Snyk
3 months
Our path to root began by looking at failed builds. We found that we could exfiltrate a file descriptor from a sandboxed build process, giving us the ability to modify a directory inside the supposedly immutable /nix/store even after the build was finished!
1
1
0
@snyksec
Snyk
3 months
We just dropped a deep dive on a series of vulnerabilities the Snyk Security Labs team found in NixOS! When chained together, they allow for a full privilege escalation from any user to root on a default installation. #NixOS #Linux #infosec #vulnerability
1
5
10
@PsychoMario
Rory McNamara
4 months
NixOS is super neat, I managed to find some vulnerabilities resulting in a pretty cool privilege escalation. I wrote about it here: https://t.co/N4S64hMMjL
2
28
63
@PsychoMario
Rory McNamara
7 months
Great work from my team: Is your local AI tooling really safe from attack?
@snyksec
Snyk
7 months
🚨 Security alert! We found vulnerabilities in Cortex.cpp (Jan AI). While self-hosted #AI is booming, security can't be an afterthought. Dive into our findings and how we addressed them. 👇
0
0
0
@katz3n_
katzen
9 months
Super happy to see the results of this years top 10 and to see my work on Cookie Tossing made it in position 10! 🥳
@PortSwiggerRes
PortSwigger Research
9 months
The results are in! We're proud to announce the Top ten web hacking techniques of 2024!
1
1
6
@snyksec
Snyk
11 months
Unveiling the mysteries of ComfyUI Custom Node Vulnerabilities with our latest blog post! 🕵️‍♂️ Dive deeper into plugin ecosystem security with our seclabs team's in-depth exploration. Don't miss it! ⚡ #AppSec #AIsecurity #ComfyUI More here:
labs.snyk.io
This research focuses on ComfyUI, a popular stable diffusion platform with over 1,300 custom node extensions available. Through real-world examples, we demonstrate how even seemingly minor vulnerab...
0
2
12
@snyksec
Snyk
1 year
Vulnerability Alert: Our SecLabs uncovered CVE-2024-21545 in Proxmox VE 8.2.2, allowing attackers with limited permissions to potentially take full control of systems. Explore our breakdown of the discovery, exploitation, and mitigation process.
labs.snyk.io
Read about a critical vulnerability (CVE-2024-21545) in Proxmox VE that allows attackers to gain full control of the system. By exploiting a flaw in the API handling, attackers with limited permiss...
0
2
1
@PsychoMario
Rory McNamara
1 year
Proxmox CVE-2024-21545! I turned a local file read into full root command execution on Proxmox VE 8.2.2. Pretty cool chain if I do say so myself. Writeup:
labs.snyk.io
Read about a critical vulnerability (CVE-2024-21545) in Proxmox VE that allows attackers to gain full control of the system. By exploiting a flaw in the API handling, attackers with limited permiss...
0
16
27
@PsychoMario
Rory McNamara
1 year
I had some fun exploiting Ubuntu 24.04 when it came out. Read more about it here:
@snyksec
Snyk
1 year
Our security labs team found a privilege escalation vulnerability chain in Ubuntu 24.04. Read about the journey of discovery and exploitation here: https://t.co/CLtJJicd5P #vulnerability #0day
2
8
43
@snyksec
Snyk
1 year
Your #code might be more vulnerable than you think. 😱 #RepoJacking is a powerful, yet widely unknown threat to your software supply chain. Learn how this attack works and how to defend against it in our latest blog post:
labs.snyk.io
0
2
2
@snyksec
Snyk
1 year
New research: Exploiting WebSockets for HTTP cache poisoning & bypassing Istio RBAC with HTTP response header injection. Learn how these attacks work & secure your apps. https://t.co/GWrorOwt3b #websecurity #istio #securityresearch
labs.snyk.io
This post outlines what we believe to be novel attacks against HTTP application middleware based on the simple foundation of HTTP response header injection.
0
1
1
@snyksec
Snyk
2 years
Learn how Snyk security researchers uncovered the #LeakyVessels container breakout Docker vulnerabilities assigned CVE-2024-21626, CVE-2024-23652, CVE-2024-23651, and CVE-2024-23653.
labs.snyk.io
0
2
4
@snyksec
Snyk
2 years
🚨 BREAKING 🚨The Snyk research team has uncovered 4 critical security vulnerabilities (#LeakyVessels) impacting core container tech including Docker, runc & related cloud infrastructure like Kubernetes. Get more details, including mitigation tips here 👉
labs.snyk.io
Snyk Security Labs Team has identified four container breakout vulnerabilities in core container infrastructure components including Docker and runc, which also impacts Kubernetes.
0
31
59