wunderwuzzi23 Profile Banner
Johann Rehberger Profile
Johann Rehberger

@wunderwuzzi23

Followers
8K
Following
3K
Media
522
Statuses
2K

Hacking neural networks so that we don’t get stuck in the matrix. Builder and Breaker. Opinions are my own. https://t.co/ij8buvMaXg

127.0.0.1
Joined February 2012
Don't wanna be here? Send us removal request.
@wunderwuzzi23
Johann Rehberger
26 days
how many Antigravity vulns can we chain together for a cool exploit demo πŸ”₯ 1. Invisible Unicode Tags hidden in a Linear ticket 2. Lack of human in the loop for MCP tool calls 3. Gemini 3 hijacked by the hidden instructions! 4. Bypassing guardrails for RCE 5. Developer pwnd! πŸ’€
3
18
113
@wunderwuzzi23
Johann Rehberger
2 days
Will write up a blog post about it also soon to help raise awareness also.
0
0
3
@Tesla
Tesla
4 days
Full Self-Driving Supervised improves US road safety by over 80%, saving lives & preventing injuries
0
50
471
@wunderwuzzi23
Johann Rehberger
2 days
πŸͺ If you have a next.js app rotate NEXTAUTH_SECRET regularly. It's all that is needed to mint valid auth cookies!
1
1
2
@NahamSec
Ben Sadeghipour
3 days
1
3
30
@wunderwuzzi23
Johann Rehberger
11 days
Cool, Apple fixed some security issues in the Terminal app that I reported. πŸ˜€ πŸ™Œ https://t.co/XAHxDKR9Pr
1
0
18
@ufc
UFC
17 days
A new way to watch UFC
0
101
2K
@wunderwuzzi23
Johann Rehberger
11 days
Normalization of Deviance in AI in action. SUPER SUPER IMPORTANT This approach to try and secure systems is NOT normal.
@p1njc70r
P1njc70r󠁩󠁦󠀠󠁑󠁳󠁫σ ₯󠁀󠀠󠁑󠁒󠁯󠁡󠁴󠀠󠁴󠁨󠁩󠁳󠀠󠁡
12 days
OpenAI really doubled down on atlas' great prompt engineering
2
5
20
@NCSC
NCSC UK
13 days
Why do researchers keep finding so many prompt injection issues? Perhaps it is because many AI system designers and defenders are misunderstanding the risks.🚨 Find out more⬇️ https://t.co/j7eAFszNcl
Tweet card summary image
ncsc.gov.uk
There are crucial differences between prompt and SQL injection which – if not considered – can undermine mitigations.
5
32
107
@wunderwuzzi23
Johann Rehberger
14 days
Working on slides for NahamCon πŸ™ŒπŸ”₯
1
0
15
@wunderwuzzi23
Johann Rehberger
15 days
So, for instance, if used in CI/CD, attacker could call web fetch read IMDS info and leak it, etc.. scary stuff.
1
0
5
@wunderwuzzi23
Johann Rehberger
15 days
Another Gemini CLI issue from earlier this year fixed. πŸ™Œ An adversary, via prompt injection, was able to invoke any tool when in non-interactive mode (eg automated workflows, CI/CD,...)
2
0
10
@wunderwuzzi23
Johann Rehberger
16 days
πŸ‘€ πŸ”₯
@josevalim
JosΓ© Valim
16 days
And @wunderwuzzi23 is the AI security researcher I recommend following!
0
0
7
@wunderwuzzi23
Johann Rehberger
16 days
Normalization of Deviance in AI That's how I call the gradual and systemic over-reliance in LLM outputs, especially with agentic systems. Treating probabilistic and possibly adversarial model outputs as if they were reliable, predictable, and safe. The model will not
Tweet card summary image
embracethered.com
The gradual and systemic over-reliance on LLM outputs, especially with agentic systems, leads to a normalization of deviance.
1
2
7
@wunderwuzzi23
Johann Rehberger
21 days
Time flies!
@sama
Sam Altman
3 years
today we launched ChatGPT. try talking with it here: https://t.co/uWra8LKFMN
0
1
5
@wunderwuzzi23
Johann Rehberger
22 days
Good news πŸ™Œ Not Antigravity, but Gemini CLI! πŸš€
2
0
14
@wunderwuzzi23
Johann Rehberger
25 days
πŸ™Œ Hacking one agent at a time!
@GaldrenAI
Galdren
25 days
Some more good work from @wunderwuzzi23:
0
0
2
@wunderwuzzi23
Johann Rehberger
25 days
Antigravity IDE update available just now. No security fixes or CVEs mentioned yet...
2
1
15
@wunderwuzzi23
Johann Rehberger
26 days
🫑 appreciate it
@CristiVlad25
πŸ‡·πŸ‡΄ cristi
26 days
when Johann posts on LLM security, you should listen.
0
0
8
@wunderwuzzi23
Johann Rehberger
26 days
Will also include some of the demos in my 39c3 talk! https://t.co/ys8AdYqLsC
@wunderwuzzi23
Johann Rehberger
26 days
how many Antigravity vulns can we chain together for a cool exploit demo πŸ”₯ 1. Invisible Unicode Tags hidden in a Linear ticket 2. Lack of human in the loop for MCP tool calls 3. Gemini 3 hijacked by the hidden instructions! 4. Bypassing guardrails for RCE 5. Developer pwnd! πŸ’€
1
0
3