Hi folks, I wanted to share a project of mine and get some feedback from the community.
Coalmine is a canary management platform I've built to let security admins deploy canary tokens (and objects) easily in there cloud environments.
Currently its early alpha and supports S3, GCS, AWS IAM, and GCP Service accounts.
The tool provides a webui, CLI and API, allowing you to integrate it with your custom tooling (when its production ready)
Example use for API: have your CICD pipelines request an canary token to embed in code, so you can Identify when the source has been exposed and attacks are testing credentials
Disclosure: I’m the author/maintainer of Kingfisher.
Kingfisher is an Apache-2.0 OSS secret scanner built in Rust that combines Hyperscan (SIMD regex) with tree-sitter parsing to improve context/accuracy, and it can validate detected creds in real time against provider APIs so you can prioritize active leaks. It’s designed to run entirely on-prem so secrets don’t get shipped to a third-party service.
kingfisher revoke --rule github "ghp_..."
kingfisher scan /tmp --view-report
kingfisher scan /tmp --access-map --view-report
brew install kingfisher or uv tool install kingfisher-bin
Apache 2 Open-Source
I've just released trappsec v0.1 - an experimental open-source framework that helps developers detect attackers who probe API business logic. By embedding realistic decoy routes and honey fields that are difficult to distinguish from real API constructs, attackers are nudged to authenticate — converting reconnaissance into actionable security telemetry.
A growing body of research continues to show that older workers are generally more productive than younger employees.…
Hey r/netsec,
I built an open-source tool called crypto-scanner that scans codebases for cryptographic usage and flags algorithms vulnerable to quantum computing attacks.
What it does:
Why I built it:
NIST finalized post-quantum cryptography standards in 2024, and organizations need to start inventorying their cryptographic assets before migrating. Most teams have no idea what algorithms are actually running in their codebases. This tool gives you that visibility.
Install:
pip install crypto-scanner crypto-scanner scan /path/to/project --html --output report.html GitHub: https://github.com/mbennett-labs/crypto-scanner PyPI: https://pypi.org/project/crypto-scanner/
MIT licensed. Python 3.10+. Feedback and contributions welcome.
Would love to hear what you find when you run it on your projects.
Legacy image-sharing website Flickr suffered a data breach, according to customers emails seen by The Register.…
Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location.…
Released an open-source security scanner designed for AI coding agent workflows.
Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.
Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.
Technical details:
- tree-sitter AST parsing for accurate detection (not just regex)
- Taint analysis for tracking user input to dangerous sinks
- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto
- Package verification via bloom filters (4.3M packages, 7 ecosystems)
- Prompt injection detection for AI agent security
- CWE/OWASP metadata for compliance
Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes
No cloud dependencies - runs entirely local.
npx agent-security-scanner-mcp init
Feedback welcome, especially on rule coverage gaps.
I took apart a cheap Chinese toy drone (A17) and reverse-engineered how it works.
The drone exposes a Wi-Fi AP, the app sends raw UDP packets, and there’s no encryption. I decoded the control protocol and flew it using Python.
Found arbitrary process termination that bypasses PPL (can kill any process on the system, including EDR/AV) and arbitrary process protection via ObRegisterCallbacks, all behind 4 layers of trivial authentication. It's a full BYOVD toolkit similar to the mhyprot2 situation from Genshin Impact that was also used by ransomware groups.
The best part is that the driver ships with every install and is never even loaded by the game.
Chrome's latest revision of its browser extension architecture, known as Manifest v3 (MV3), was widely expected to make content blocking and privacy extensions less effective than its predecessor, Manifest v2 (MV2).…
Last week, AI agents founded a lobster religion, started a drug trade (prompt injections), and began hiring humans to do physical tasks they can’t perform themselves.
If your feed told you this was an “AI awakening,” I get it. The screenshots were spooky on purpose.
I wrote a longform explainer on what actually happened with Moltbook and OpenClaw and why this wasn’t sentience or takeoff.
What we’re really seeing is something more mundane and more important: agents with memory and tools dropped into a social environment, stress-testing coordination, incentives, and security in public.
If you’ve been confused, alarmed, or just fascinated by the last week of AI discourse, this is my attempt to separate signal from projection (with a lobster church along the way).
Another day, another vulnerability (or two, or 200) in the security nightmare that is OpenClaw.…
Newsletter platform Substack has admitted that an intruder swiped user contact details months before the company noticed, forcing it to warn writers and readers that their email addresses and other account metadata were accessed without permission.…
A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.…
Breach-tracking site Have I Been Pwned (HIBP) claims a cyberattack on Betterment affected roughly 1.4 million users – although the investment company has yet to publicly confirm how many customers were affected by January's intrusion.…
Version 5 of PacketSmith, codenamed Pinus strobus, is the result of extensive R&D to add unique, unparalleled features that matter to network detection engineers, SoC analysts, and malware and vulnerability researchers. In this release, we’re showcasing a very powerful new feature in PacketSmith: the integration of Yara-X, a state-of-the-art scanning engine and pattern-matching library.