dryrunsec Profile Banner
DryRun Security Profile
DryRun Security

@dryrunsec

Followers
122
Following
20
Media
23
Statuses
45

The industry’s first AI-native, agentic code security intelligence platform that's helping teams cut noise, find risks, and secure future-ready software.

Austin, TX
Joined September 2022
Don't wanna be here? Send us removal request.
@dryrunsec
DryRun Security
10 hours
“Zero rule violations” isn’t the win you think it is. When static checks become the target, teams optimize around the meter, not the risk. In this post, DryRun Security CEO & Co-founder @wickett Wickett unpacks how rules decay in living systems, why developer experience
0
0
1
@dryrunsec
DryRun Security
5 days
Looks like Christmas came early 👀 We're this👇 excited about our new whitepaper on building secure AI applications! Check it out at https://t.co/JP48mNiInO
0
0
1
@dryrunsec
DryRun Security
7 days
Building with AI ≠ securing a web app with an LLM tacked on. This breakdown covers the seven failure patterns we keep seeing in production: treating models as trusted compute, burying policy in prompts, over-authorizing agents, ignoring RAG as an attack surface, and more. If
2
0
2
@dryrunsec
DryRun Security
11 days
AI is moving fast. Faster than most security programs. Earlier this week, GeminiJack, a zero-click AI vulnerability, exposed serious gaps in how LLMs are being integrated into enterprise systems. No user action. No obvious warning. Real risk. This is the pattern we keep seeing.
Tweet card summary image
techfinitive.com
Davey Winder explains what GeminiJack is, how it symbolises a new breed of attacks via AI and what organisations can do to protect themselves
0
0
1
@dryrunsec
DryRun Security
14 days
LLM apps are moving fast, and the risks are moving faster. That’s why we’ve developed a guide for securing AI Applications. In “Building Secure AI Applications,” we break down how the OWASP LLM Top 10 shows up in real systems and map each risk to controls teams can actually
0
4
4
@dryrunsec
DryRun Security
19 days
Mark Burgess once pointed out that determinism in large systems is mostly an illusion. He was right. We pretend our tools can capture risk with fixed rules, but modern software isn’t static enough for that. In our most recent post, @wickett discusses how AI is pushing us into
0
1
2
@dryrunsec
DryRun Security
1 month
The teams that win in modern AppSec are not the ones who find the most reachable paths, but the ones who can prove what is actually exploitable. In head-to-head evaluations (including AI-native SAST) DryRun Security keeps winning because we verify intent and behavior before a
0
0
1
@dryrunsec
DryRun Security
1 month
We’re at @ainativedev Con New York! DryRun Security is a sponsor, and @cktricky & Andrea Swaney will be on-site. Come say hi at our booth! 🎁 We’re giving away copies of “Vibe Coding: Building Production-Grade Software with GenAI, Chat, Agents, and Beyond,” and you can register
0
1
3
@dryrunsec
DryRun Security
2 months
Yes to AI code review. Bigger yes to CSA that closes the gaps.
@cktricky
Ken Johnson
2 months
I posted this last Friday on LinkedIn, do you disagree? Let me hear you if so 😄
0
0
2
@dryrunsec
DryRun Security
2 months
Would you trust a pitcher calling their own pitches (especially if you’re on the opposing team)? Definitely not. You’d want an unbiased call. Frontier LLM assistants are phenomenal at writing code but they shouldn’t be your security authority. In this post, we break down why
0
0
1
@dryrunsec
DryRun Security
2 months
It worked…sometimes. The “it” being our early “Behavioral Questions” prototype (YAML + a slice of code context) that was the first answer to the question: What if you could ask a security question IN PLAIN ENGLISH “Does this change modify authentication logic?” AND get an
0
0
1
@dryrunsec
DryRun Security
2 months
Huge thanks to the @LASCONATX volunteer team (incredible hosts) and to everyone who stopped by our booth for great #appsecurity conversations. If you missed it live, catch @wickett's talk "Out of Control: Promise Theory and the Future of Code Security Agents" slides here:
Tweet card summary image
promise-theory-34zpp7h.gamma.site
Scaling Code Security Through Promises, Not Control James Wickett || X: @wickett || LinkedIn: /in/wickett
0
1
3
@dryrunsec
DryRun Security
2 months
Stop writing policies like it’s 2015. We use natural language and an agentic approach to understand code context in every PR so your AppSec is fast, accurate, scalable. Read more about each step of our journey at https://t.co/fWxzHRaSBW
0
1
1
@dryrunsec
DryRun Security
3 months
Thrilled to team up with @secdim to connect DryRun Security contextual risk insights with hands-on secure coding labs. This helps engineering teams turn findings into learning and fixes faster. Thanks, Pedram, for this innovative use case for the DryRun MCP!
@secdim
SecDim
3 months
This is how you use SAST findings to upskill developers in security, right in your Claude IDE. Brought to you by @dryrunsec + @secdim #sast #training #securecoding
0
1
3
@dryrunsec
DryRun Security
3 months
From alert to assurance in minutes. CTO and Co-founder @cktricky walks through how DryRun Security Code Insights MCP helps teams investigate NPM supply chain threats without manual toil, saving hours of effort. Teams use Code Insights MCP to move faster during incidents and
0
4
5
@dryrunsec
DryRun Security
3 months
Get superhuman visibility into your security posture, architecture, and more! Announcing DryRun Security Code Insights MCP. Now you can ask your code what changed and why: 👉 “Hey DryRun, are there any new admin endpoints this week?” 👉 “Which PRs touched auth or payments?”
0
2
4
@dryrunsec
DryRun Security
4 months
CodeRabbit RCE wasn’t prompt injection—it was tool execution + isolation drift + secrets exposure. We’ve stumbled too (IDOR in closed beta), which is why our sandboxed approach avoids this class of risk. 🔗Read more: https://t.co/LwC0X7yJEJ
0
3
4
@anshuman_bh
Anshuman Bhartiya
5 months
📣📣📣 The Boring AppSec Podcast Ep. 22 is out with @cktricky (Co-Founder and CTO @dryrunsec )! I really enjoyed this conversation with @JubbaOnJeans and Ken as all of us have been building in the AI space for some time now and have stumbled upon similar blockers and
0
1
4