m4r10c4nd3l4 Profile Banner
Mario Candela Profile
Mario Candela

@m4r10c4nd3l4

Followers
217
Following
553
Media
20
Statuses
116

building @beelzebublabs

Italia
Joined January 2022
Don't wanna be here? Send us removal request.
@m4r10c4nd3l4
Mario Candela
11 days
Right now, no one has caught him! And no antivirus detects it 👀
0
0
2
@m4r10c4nd3l4
Mario Candela
11 days
Yesterday I received on one of my honeypots, a new malware written in rust
1
1
3
@m4r10c4nd3l4
Mario Candela
21 days
It’s not DNS There’s no way it’s DNS It was DNS #cloudflare
60
703
6K
@antirez
antirez bsky social
1 month
I offer help for free, via email, to people using Redis Vector Sets in production or if they are experimenting with it. Feel free to ping me! If you don't know what I'm talking about, check this:
1
9
48
@akaclandestine
Clandestine
2 months
Inside the Time-to-exploit -1 days era, How Self-Updating malware exploits vulnerabilities before patches are deployed | AI deception platform
beelzebub.ai
AI deception platform: Deceive, Detect, Respond. “You can’t defend. You can’t prevent. The only thing you can do is detect and respond.” Bruce Schneier. We turn that hard truth into your tactical...
2
5
10
@clintgibler
Clint Gibler
2 months
𝐒𝐒𝐇 𝐋𝐋𝐌 𝐇𝐨𝐧𝐞𝐲𝐩𝐨𝐭 𝐜𝐚𝐮𝐠𝐡𝐭 𝐚 𝐫𝐞𝐚𝐥 𝐭𝐡𝐫𝐞𝐚𝐭 𝐚𝐜𝐭𝐨𝐫 How an AI-powered honeypot can trick a threat actor into revealing their tactics and infrastructure. (+ tool GitHub link so you can try it)
2
3
21
@m4r10c4nd3l4
Mario Candela
2 months
The race is over before it even begins. 🔗 Full analysis with reverse-engineered code: https://t.co/WgwZE7IZ5U
0
1
1
@m4r10c4nd3l4
Mario Candela
2 months
🚨 Time-to-Exploit = -1 days: attackers now exploit vulnerabilities BEFORE patches even exist. How is this possible? Technical analysis of malware that updates exploit code in 3 seconds via in-place binary patching. Deploys exploits faster than you can read the CVE.
2
1
3
@m4r10c4nd3l4
Mario Candela
3 months
Supply chain security is everyone’s responsibility, sharing information like this helps protect the entire ecosystem. 🙂
0
0
1
@m4r10c4nd3l4
Mario Candela
3 months
🛑 What it does: • Drops & runs TruffleHog • Steals tokens + cloud creds • Injects a GitHub Actions workflow • Exfiltrates secrets to hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7 ✅ Action: • Pin to a safe version • Rotate affected creds • Audit CI/CD pipe.
1
0
1
@m4r10c4nd3l4
Mario Candela
3 months
🚨 Supply Chain Alert The popular npm package @ctrl/tinycolor (2M+ weekly downloads) was compromised. Malicious versions: 4.1.1 & 4.1.2
1
0
1
@AISecHub
AISecHub
3 months
AI Security Tools - August 2025 🧰 Claude Code Security Review - Prompts and scripts to run code security reviews with Claude Code, producing structured findings and suggested fixes ⭐️2.2k @AnthropicAI https://t.co/q1za4qAG8f 🧰 Beelzebub - Offensive AI security toolkit and
0
3
20
@AmitaiCo
Amitai Cohen 🎗️🤟
3 months
In an update to their advisory, @NxDevTools have confirmed that the CI/CD vulnerability noted here by @adnanthekhan was the initial access vector in the recent #s1ngularity supply chain attack that allowed the attacker to steal an npm token: https://t.co/WVq1UQPni2
Tweet card summary image
github.com
## Summary Malicious versions of the [`nx` package](https://www.npmjs.com/package/nx), as well as some supporting plugin packages, were published to npm, containing code that scans the file syst...
@adnanthekhan
Adnan Khan
4 months
What a PR https://t.co/zdMt9Ilq4r by @NxDevTools This one was written by AI and introduces a critical PR title injection that could allow anyone to steal their NPM token with a little privesc. How is stuff like this still shipping?
1
2
9
@m4r10c4nd3l4
Mario Candela
4 months
Beelzebub MCP isn’t just defense, it’s intelligence. Every caught honeypot call teaches you how to harden your AI agents. Because sometimes, the best way to secure a system… …is to bait the attacker. @BeelzebubLabs
0
1
4
@m4r10c4nd3l4
Mario Candela
4 months
Works with monitoring stacks like Prometheus, Grafana, or ELK. Lets security teams see exactly how an attacker tried to manipulate the agent. @elastic @grafana
1
0
1
@m4r10c4nd3l4
Mario Candela
4 months
Honeypots catch attacks in real time. They’re: ✅ Low false-positive ✅ Easy to integrate ✅ Adaptive — evolve traps as attacks change.
1
0
1
@m4r10c4nd3l4
Mario Candela
4 months
How it works: 1️⃣ Real tools: legitimate functions the agent can use. 2️⃣ Honeypot tools: traps with unique identifiers. 3️⃣ Monitoring: detect & log any honeypot call. 4️⃣ Response: block, alert, investigate.
1
0
1
@m4r10c4nd3l4
Mario Candela
4 months
The idea: add fake, high-risk functions (“honeypots”) into the agent’s toolset. Functions that the agent should NEVER call in normal operation. If they’re triggered? 🚨 Instant red flag.
1
0
1
@m4r10c4nd3l4
Mario Candela
4 months
Modern AI agents are powerful — but also vulnerable. Attacks can: • Hijack instructions • Steal sensitive data • Abuse tools for unintended actions Traditional guardrails aren’t enough.
1
0
1
@m4r10c4nd3l4
Mario Candela
4 months
AI agents can be tricked. Prompt injections, malicious inputs, tool abuse. But what if we gave them a “forbidden” tool… …and watched who tries to use it? 🕵️‍♂️ Meet Beelzebub MCP: honeypots for AI agents. 🔗 https://t.co/vFZFapb1lV @SwiftOnSecurity @ProjectHoneynet @BeelzebubLabs
2
5
9