supriza0 Profile Banner
Raul Onitza-Klugman Profile
Raul Onitza-Klugman

@supriza0

Followers
48
Following
33
Media
3
Statuses
26

AI Red Team at @zenitysec. Web, binary and organic vegetable growing. Oh and AI too, duh.

Israel
Joined June 2019
Don't wanna be here? Send us removal request.
@supriza0
Raul Onitza-Klugman
3 months
Some food for thought around leveraging prompt injection to exploit vulns in MCP servers πŸ•΅οΈ
@snyksec
Snyk
3 months
Prompt Injection + Classic Vulns = A NEW Threat! 🀯 Our Sec Labs team found ways to weaponize prompt injections to exploit vulnerabilities in real MCP servers. See how an unsuspecting dev gets owned, step-by-step. 🧡
0
0
0
@liran_tal
Liran Tal
3 months
/1 🚨 mega-thread on exploiting MCP servers via prompt injection, buckle up πŸ‘‡
5
26
77
@snyksec
Snyk
3 months
We just dropped a deep dive on a series of vulnerabilities the Snyk Security Labs team found in NixOS! When chained together, they allow for a full privilege escalation from any user to root on a default installation. #NixOS #Linux #infosec #vulnerability
1
5
10
@supriza0
Raul Onitza-Klugman
4 months
Rory at it again, privescing in NixOS! πŸ”₯
@PsychoMario
Rory McNamara
4 months
NixOS is super neat, I managed to find some vulnerabilities resulting in a pretty cool privilege escalation. I wrote about it here: https://t.co/N4S64hMMjL
0
0
1
@_0xffd
Aviad
7 months
🚨 New twist in the tj-actions attack: A complex story unfolding β€” started 3 months earlier than publicly known, slipping in through SpotBugs before spreading across orgs. More details here ⬇️ https://t.co/u2q1ztpZXB
0
4
21
@supriza0
Raul Onitza-Klugman
7 months
Latest research I've done on local AI security showcasing vulnerabilities in @jandotai's AI engine πŸ•΅οΈ
@snyksec
Snyk
7 months
🚨 Security alert! We found vulnerabilities in Cortex.cpp (Jan AI). While self-hosted #AI is booming, security can't be an afterthought. Dive into our findings and how we addressed them. πŸ‘‡
0
0
0
@supriza0
Raul Onitza-Klugman
9 months
Elliot's Cookie Tossing research in the top 10! πŸ’ͺ
@katz3n_
katzen
9 months
Super happy to see the results of this years top 10 and to see my work on Cookie Tossing made it in position 10! πŸ₯³
0
0
0
@snyksec
Snyk
11 months
Unveiling the mysteries of ComfyUI Custom Node Vulnerabilities with our latest blog post! πŸ•΅οΈβ€β™‚οΈ Dive deeper into plugin ecosystem security with our seclabs team's in-depth exploration. Don't miss it! ⚑ #AppSec #AIsecurity #ComfyUI More here:
labs.snyk.io
This research focuses on ComfyUI, a popular stable diffusion platform with over 1,300 custom node extensions available. Through real-world examples, we demonstrate how even seemingly minor vulnerab...
0
2
12
@snyksec
Snyk
2 years
🚨 BREAKING 🚨The Snyk research team has uncovered 4 critical security vulnerabilities (#LeakyVessels) impacting core container tech including Docker, runc & related cloud infrastructure like Kubernetes. Get more details, including mitigation tips here πŸ‘‰
labs.snyk.io
Snyk Security Labs Team has identified four container breakout vulnerabilities in core container infrastructure components including Docker and runc, which also impacts Kubernetes.
0
31
59
@supriza0
Raul Onitza-Klugman
3 years
#FetchtheFlag 2022 is a wrap! Had loads of fun creating some of the challenges and running it. Time to do some research πŸ•΅οΈ
@snyksec
Snyk
3 years
πŸ™ Huge thanks to everyone for participating in this year's #FetchtheFlag #CTF! It was a blast πŸ’₯ Be on the lookout tomorrow for the solution write-ups. In the meantime, let us know β€” what were your favorite challenges? What challenges drove you crazy? πŸ‘‡
3
1
6
@supriza0
Raul Onitza-Klugman
3 years
Created a repo that shows how to find the latest #OpenSSL CVE-2022-3602 buffer overflow using libFuzzer. https://t.co/YGjnFi9PWE
github.com
Contribute to supriza/openssl-v3.0.7-cve-fuzzing development by creating an account on GitHub.
0
0
1
@KhaledYakdan
Khaled Yakdan
3 years
Do you have ideas how to find new classes of bugs with fuzzing? Now you can get a reward of over $11K for every detector. Great initiative by @Google's OSS-Fuzz team to foster the work on exploring the potential of #fuzzing beyond memory corruption bugs. https://t.co/JpZg4cJhIV
Tweet card summary image
security.googleblog.com
Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz β€”our community fuzzing servi...
0
22
91
@snyksec
Snyk
4 years
🚨 A malicious actor targeting a still unknown company is using an internal #JS package "gxm-reference-web-auth-server". If your company uses this package, make sure to inform your #AppSec team. More info here. πŸ‘‡ #npm #JavaScript https://t.co/hGWO3SQ7LT
snyk.io
Once in a while we encounter a truly malicious package that has a purpose, means, and is production-ready β€” this is a story about one found in npm: gxm-reference-web-auth-server.
1
11
19
@supriza0
Raul Onitza-Klugman
4 years
True true
@chompie1337
chompie
4 years
a watched fuzzer never finds crashes
0
0
0
@supriza0
Raul Onitza-Klugman
4 years
Look mom, we created a CTF πŸŽ‰
@snyksec
Snyk
4 years
⛳️ Start the new year right with some fun #CTF practice! That's right β€” our #SnykCon 2021 CTF challenges are now available online so you can prepare for the next CTF (#FetchTheFlag). 🀘 Register below and have fun! πŸ”—: https://t.co/dz2YMSysxI
0
0
1
@IntentSummit
INTENT - The security research summit
4 years
"1-Click to Infiltrate your Organization via Vulnerable VS Code Extensions" by @byte89 and Raul Onitza-Klugman is now available on-demand! https://t.co/J75eox3z8R
1
2
3
@supriza0
Raul Onitza-Klugman
4 years
First meetup ever - check! First sticker on my laptop - check! (@liran_tal was told yours is waiting for you in the desert) Thanks #NegevWebDevelopers and @yanaiEdri for having me.
4
1
7
@ekoparty
Ekoparty | Hacking everything
4 years
ΒΏQuΓ© charlas habrΓ‘ este aΓ±o en el Main Track de la #Eko2021?πŸš€πŸŒ• πŸ’₯1-CLICK TO INFILTRATE YOUR ORGANIZATION VIA VULNERABLE VS CODE EXTENSIONS by @supriza0 & @byte89 Para leer la descripciΓ³n y comprar tu entrada πŸ‘‰ https://t.co/G8NXEkYDRA
0
2
5
@supriza0
Raul Onitza-Klugman
4 years
Things I enjoy lately: 1. Catching up on binary exploit techniques. 2. Changing my son's diaper while he sleeps.
0
0
1
@kennbroorg
kennbro
4 years
Beautiful talk of vulnerabilities in VS Code extensions from @byte89 and @supriza0 But, I am a humble developer and I don't see my favorite IDE in the picture. Where is the VI? 😒 Please don't hate me
1
3
11