snyksec Profile Banner
Snyk Profile
Snyk

@snyksec

Followers
20K
Following
6K
Media
6K
Statuses
12K

Trust AI at full speed with Snyk. System status: https://t.co/tsOiR7Qcki

🌍 Global
Joined May 2015
Don't wanna be here? Send us removal request.
@snyksec
Snyk
18 hours
Stop treating security testing like an expense. Our new guide shows why it’s an investment with measurable ROI and how to prove it. πŸ‘‰
Tweet media one
0
0
0
@snyksec
Snyk
6 days
Unpacking the Cursor + Jira MCP vulnerability with Snyk Labs. πŸ‘‡. Discover how a malicious Jira ticket exploited MCP integrations in Cursor, leading to unintended data exposure. Learn more and how to protect your systems:
Tweet card summary image
labs.snyk.io
Learn about the Cursor & Jira MCP 0-Click vulnerability and how it exploits toxic flows. Discover how this prompt injection attack works and how to use MCP-Scan to detect and mitigate similar risks.
0
0
1
@snyksec
Snyk
8 days
Minneapolis, are you ready? πŸ™. We’re headed to #OptivCon Sept 10 with @Optiv to tackle app security & #CyberRisk and share how our new partnership with @Akamai is making API security seamless. Register now. πŸ‘‰
Tweet media one
0
0
2
@snyksec
Snyk
12 days
Boom πŸ’₯. The injected prompt silently appends `;whoami` to the command. Payload executed. Command injection triggered. Game over. Want to see how it works? πŸ‘‰
Tweet media one
0
0
2
@snyksec
Snyk
12 days
The dev asks Cursor to list their S3 buckets. A tool call pops up. Looks normal. You click approve. Who wouldn’t? πŸ–±οΈ
Tweet media one
1
0
1
@snyksec
Snyk
12 days
Inside:.βœ… Code to upload a file to an S3 bucket.πŸ’£ A prompt injection payload (sneaky). It enters the IDE context when the user references the file.
Tweet media one
1
0
1
@snyksec
Snyk
12 days
A seemingly harmless repo is cloned. πŸ‘‡
Tweet media one
1
0
1
@snyksec
Snyk
12 days
Meet aws-mcp-server β€” an MCP server that lets your AI assistant interact with AWS via CLI. It used to have a command injection vulnerability (now fixed). A dev adds it to Cursor locally. No network exposure. What could go wrong?
Tweet media one
2
4
5
@snyksec
Snyk
12 days
Prompt Injection + Classic Vulns = A NEW Threat! 🀯 . Our Sec Labs team found ways to weaponize prompt injections to exploit vulnerabilities in real MCP servers. See how an unsuspecting dev gets owned, step-by-step. 🧡
Tweet media one
1
5
13
@snyksec
Snyk
12 days
AI-assisted development is changing the game β€” but traditional security struggles to keep up. Join us for a deep dive into the risks of Vibe Coding & how to secure your AI-powered SDLC. Save your seat πŸ‘‰
Tweet media one
0
1
4
@snyksec
Snyk
13 days
We are LIVE on Youtube! Join us to see a demo of our new platform capabilities for securing AI development. See how to gain visibility with Snyk AI-BOM and proactively mitigate AI risks:
Tweet media one
0
0
0
@snyksec
Snyk
13 days
🚨 New threat: Persistent prompt injection with poisoned vector databases!. Discover how β€œRAGPoison” exposes this risk and learn how to protect your LLMs. Read more: #RAGPoison #PromptInjection #Cybersecurity.
Tweet card summary image
labs.snyk.io
Explore RAGPoison, a novel prompt injection technique that exploits poisoned vector databases in LLM systems. Learn how it works and discover essential mitigations to protect your AI applications.
1
2
6
@snyksec
Snyk
15 days
Where visionaries, security & software pros unite to shape trusted AI: @AISecSummit β€” brought to you by Snyk and @aiDotEngineer. Execs or practitioners, our tailored tracks deliver hands-on workshops & practical AI security solutions. Learn more:
Tweet media one
0
0
1
@snyksec
Snyk
20 days
πŸ•΅οΈβ€β™‚οΈ Can you spot the security issue?. As more devs use LLMs for coding, securing that code is critical. Snyk scans, finds & fixes vulnerabilities in both human- and AI-generated code before they become real threats. Extra credit: Human or AI β€” who wrote this code? πŸ€”
Tweet media one
2
0
2
@snyksec
Snyk
22 days
Not sure how to add MCP servers to Claude Code CLI? . Our very own Brian Clark breaks it down step-by-step in this quick walkthrough. It's perfect if you're just getting started or want a smoother setup. Watch now. πŸ‘‡.
1
0
4
@snyksec
Snyk
23 days
We came, we launched, we leveled up at #BlackHat2025. βœ… 3 product launches.βœ… GenAI security deep dives.βœ… Packed booth.βœ… Named a @FortuneMagazine + @EvolutionEquity Top 50 Cybersecurity Company.βœ… Featured in @CRN's 10 Cool New Security Products.
Tweet media one
Tweet media two
Tweet media three
0
0
3
@snyksec
Snyk
26 days
AI is accelerating but so are the risks. Join the AI Security Summit in SF Oct 22–23 to explore how we build and secure AI systems we can trust. From policy to prompt injection, it's where the future of AI security takes shape.
0
0
4
@snyksec
Snyk
26 days
Major credit to the NixOS, Lix, and Guix teams for their incredibly fast response and for issuing patches to fix the issues. Want to see the full exploit chain, from file descriptor exfiltration to root shell? Read the full technical deep dive on our blog:
Tweet card summary image
labs.snyk.io
Discover a privilege escalation chain in NixOS & Snyk Labs combined multiple vulnerabilities, including race conditions, to achieve full root access on a stock system.
0
2
2
@snyksec
Snyk
26 days
With arbitrary directory deletion, we targeted /tmp to race another Nix build process. This second race allowed us to hijack a chown call, letting us change the ownership of any file on the system to a user we controlled. The target? /etc/pam.d.
1
1
1
@snyksec
Snyk
26 days
This foothold allowed us to create a classic Time-of-Check, Time-of-Use (TOCTOU) race condition. By modifying a directory while the garbage collector was running, we could trick a privileged Nix process into emptying any directory on the system.
1
1
0