David Dworken Profile
David Dworken

@ddworken

Followers
532
Following
40
Media
2
Statuses
45

Security at Anthropic | Previously web security @ Google | https://t.co/bcVSpNtgvN | Opinions my own

Seattle
Joined January 2015
Don't wanna be here? Send us removal request.
@ddworken
David Dworken
2 months
To try it out, run: ``` /plugins marketplace add anthropics/claude-code /plugin install security-guidance ```
0
0
4
@ddworken
David Dworken
2 months
Check out the security-guidance plugin that I worked on in this launch! It automatically injects security guidance if Claude uses potentially dangerous libraries or functions. This is an early experiment, but we already have data showing this helping Claude write more secure code
@claudeai
Claude
2 months
Today we’re introducing Claude Code Plugins in public beta. Plugins allow you to install and share curated collections of slash commands, agents, MCP servers, and hooks directly within Claude Code.
3
0
10
@claudeai
Claude
2 months
Today we’re introducing Claude Code Plugins in public beta. Plugins allow you to install and share curated collections of slash commands, agents, MCP servers, and hooks directly within Claude Code.
196
476
5K
@AnthropicAI
Anthropic
3 months
We’re at an inflection point in AI’s impact on cybersecurity. Claude now outperforms human teams in some cybersecurity competitions, and helps teams discover and fix code vulnerabilities. At the same time, attackers are using AI to expand their operations.
96
210
2K
@IceSolst
solst/ICE of Astarte
4 months
Got nerdsniped by the new Claude Code security review tool, here’s a deep dive: @AnthropicAI implemented their own SAST tool as a Python wrapper around the @claudeai API. It can run locally (in CC) or within Github actions to focus on PRs. Tests I ran: 1. It found Heartbleed!
24
55
393
@mikeyk
Mike Krieger
5 months
Particularly excited for this launch — Claude Code can now review your code for security vulnerabilities. We're using this internally at Anthropic and it's already caught issues before we shipped them.
@AnthropicAI
Anthropic
5 months
Claude Code can now automatically review your code for security vulnerabilities.
26
18
440
@logangraham
Logan Graham
5 months
this started as a hackathon project that we used ourselves to find vulns! In the next 2 years, the world might 10/100/1000x the code it puts out. The only way to keep up is by using models to make it secure before it ever becomes a problem
@claudeai
Claude
5 months
We just shipped automated security reviews in Claude Code. Catch vulnerabilities before they ship with two new features: - /security-review slash command for ad-hoc security reviews - GitHub Actions integration for automatic reviews on every PR
3
10
89
@ddworken
David Dworken
5 months
I'm super proud to have worked on this launch! It started as a hackathon project and now we're here 🎉
@claudeai
Claude
5 months
We just shipped automated security reviews in Claude Code. Catch vulnerabilities before they ship with two new features: - /security-review slash command for ad-hoc security reviews - GitHub Actions integration for automatic reviews on every PR
7
0
18
@mikispag
Michele Spagnuolo (miki.it)
10 months
Excited to present Security Signals with @ddworken and @we1x, my primary project at Google for the past five years. Thanks, @madwebwork! Paper: https://t.co/8d6V5HaYHE Slides:
Tweet card summary image
speakerdeck.com
The area of security measurability is gaining increased attention, with a wide range of organizations calling for the development of scalable approaches…
0
2
11
@royalhansen
Royal Hansen
11 months
"This blog post aims to provide a detailed blueprint for how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities." https://t.co/7TsK8ZFRrO
Tweet card summary image
bughunters.google.com
Learn more about how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities.
1
16
38
@we1x
Lukas Weichselbaum
11 months
Building secure web apps shouldn't be a burden. We've built a high-assurance web framework at Google that makes security easy for developers. Learn about our "Secure by Design" approach and how it works in our new blog post: https://t.co/Iq19llnlEj cc: @ddworken
0
14
53
@ddworken
David Dworken
1 year
This is one of my favorite things about Google's security team, getting to work on security exercises like this is unimaginably exciting
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
Celebrating 15 years of password hacking 💻 🔑, Swiss Army knives (and sometimes even chainsaws or swords) included! 😲 Discover how Google's security teams turn employee farewells into security tests. https://t.co/Mapn7Nrs78
0
1
5
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
Celebrating 15 years of password hacking 💻 🔑, Swiss Army knives (and sometimes even chainsaws or swords) included! 😲 Discover how Google's security teams turn employee farewells into security tests. https://t.co/Mapn7Nrs78
Tweet card summary image
bughunters.google.com
The Leaving Tradition in Google's security team, which could be described as a type of small-scale offensive security exercise, is a great (and fun) example of team culture. Curious? See this blog...
1
31
109
@we1x
Lukas Weichselbaum
1 year
My @LocoMocoSec keynote slides on "Google's Recipe for Scaling (Web) Security" are online now: https://t.co/0CaClh0lX0
3
13
40
@LocoMocoSec
LocoMocoSec: Hawaiʻi Security Conference
1 year
Day 2 @LocoMocoSec starting with @Google's Principal Information Security Engineer Artur Janc and Staff Information Security Engineer David Dworken! 🌟 @arturjanc @ddworken Join us: https://t.co/nNXe6VlujA
0
2
6
@LocoMocoSec
LocoMocoSec: Hawaiʻi Security Conference
2 years
🎉 Register now to see @Google's Principal Information Security Engineer Artur Janc and Staff Information Security Engineer David Dworken present their talk "How Blocking Third-Party Cookies Can Fix the Web's Security Model" @LocoMocoSec! 🌟 @arturjanc @ddworken
1
6
19
@royalhansen
Royal Hansen
2 years
"To understand the full impact of this, we can also look at our overall security feature coverage, where we can see statistics such as 96% of our most sensitive services enforcing CSP, and 80% of our most sensitive services enforcing Trusted Types" https://t.co/kmuiwz2MGG
Tweet card summary image
bughunters.google.com
There are vastly more engineers at Google dedicated to creating and maintaining new products than there are security engineers working to secure products. For this reason, Google security has to...
0
10
23
@we1x
Lukas Weichselbaum
2 years
How we scale web security at Google to address XSS and other common web security issues: https://t.co/N8rQSZlEmh
2
9
30
@GoogleVRP
Google VRP (Google Bug Hunters)
2 years
Are you interested in learning more about "Securely Hosting User Data in Modern Web Applications"? See our latest blog post for details! https://t.co/HK12srLfey
Tweet card summary image
bughunters.google.com
Many web applications need to display user-controlled content. This has always been difficult to do securely, so we've worked to find easy, but secure solutions that can be applied to most types of...
0
27
101
@erchiang
Eric Chiang
4 years
Today, we're open sourcing a log4j JAR scanner. Throw it at a filesystem, detect vulnerable JARs, and even rewrite them in place. Includes a Go API to import the JAR parsing for other applications. https://t.co/TWC4SJFm3p
Tweet card summary image
github.com
A log4j vulnerability filesystem scanner and Go package for analyzing JAR files. - google/log4jscanner
7
523
2K