❌

Normal view

Received yesterday β€” 25 March 2026 ⏭ /r/netsec - Information Security News & Discussion

Our first pentest on a 100% Vibe coded application : analysis & feedback

We pentested a web app built 100% with AI β€” no human-written code. Functional, clean, well-structured. But security-wise, we found critical issues on day one: LFI, IDOR, vulnerable dependencies, and more.

AI-generated code is not secure by default. And vibe coding moves fast enough that security gets skipped entirely.

Full writeup with technical details and recommendations: https://www.hackmosphere.fr/en/?p=3803

Anyone else seeing this pattern in AI-generated apps?

submitted by /u/Hackmosphere
[link] [comments]

Navia breach exposed HackerOne employee PII due to a BOLA-style access in third-party system

Breach occurred at Navia Benefit Solutions, a 3rd party, not HackerOne infra.

Around 287 HackerOne employees PII leaked.

Navia delayed breach notifications by weeks. Filed at Maine AG.

Navia was independently breached. Over 10K US employee's PII exposed.

Reports point to an auth flaw (BOLA-type) enabling access to employee PII (SSNs, DoB, addresses, benefits data).

Exposure window: Dec 2025 to Jan 2026.

submitted by /u/raptorhunter22
[link] [comments]

CVE-2026-33656: EspoCRM ≀ 9.3.3 β€” Formula engine ACL gap + path traversal β†’ authenticated RCE (full write-up + PoC)

Root cause: EspoCRM's formula engine operates outside the field-level restriction layer β€” fields marked readOnly (like Attachment.sourceId) are writable through it. sourceId is concatenated directly into a file path in getFilePath() with no sanitization. Chain: modify sourceId via formula β†’ upload webshell via chunked upload β†’ poison .htaccess β†’ RCE as www-data. Six requests, admin credentials required. Coordinated disclosure β€” patched in 9.3.4.

submitted by /u/JivaSecurity
[link] [comments]

The Age-Gated Internet: Child Safety, Identity Infrastructure, and the Not So Quiet Re-Architecting of the Web

I’ve written a long-form analysis on how age-verification laws are pushing identity into internet infrastructure (OS layers, app stores, identity credentials), rather than staying at the application/content layer.

It looks at how enforcement is moving β€œdown the stack”, with governments increasingly targeting platform chokepoints like Apple/Google and device-level controls.

The piece draws on UK identity history, US telecoms, and current global regulation.

Curious how people here think this holds up technically, especially around enforcement, bypass (VPNs, forks, sideloading), and where this creates new attack surfaces.

submitted by /u/wayne_horkan
[link] [comments]
Received β€” 24 March 2026 ⏭ /r/netsec - Information Security News & Discussion

Alleged OVHcloud data of 1.6M customers and 5.9M websites posted on popular forum for sale. CEO Comments

There are reports of OVHcloud-related data being posted on a forum for sale. No official confirmation so far from OVHCloud. Given OVH’s scale, potential impact could be significant depending on scope, especially in Europe

UPDATE: OVHcloud CEO, Octave Klaba has commented that the sample dataset was not found in their system.

submitted by /u/raptorhunter22
[link] [comments]

e open-sourced 209 security tests for multi-agent AI systems (MCP, A2A, L402/x402 protocols)

Most AI security testing focuses on the model: prompt injection, jailbreaking, and output filtering.

We've been working on something different: testing the agent *system*. The protocols, integrations, and decision paths that determine what agents do in production. The result is a framework with 209 tests covering 4 wire protocols:

**MCP (Model Context Protocol)** Tool invocation security: auth, injection, data leakage, tool abuse, scope creep

**A2A (Agent-to-Agent)** Inter-agent communication: message integrity, impersonation, privilege escalation

**L402 (Lightning)** Bitcoin-based agent payments: payment flow integrity, double-spend, authorization bypass

**x402 (USDC/Stablecoin)** Fiat-equivalent agent payments: transaction limits, approval flows, compliance

Every test maps to a specific OWASP ASI (Agentic Security Initiatives) Top 10 category. Cross-referenced with NIST AI 800-2 categories for compliance reporting.

```

pip install agent-security-harness

```

20+ enterprise platform adapters included (Salesforce, ServiceNow, Workday, etc.).

MIT license. Feedback welcome. Especially from anyone running multi-agent systems in production. What attack vectors are we missing?

submitted by /u/Careful-Living-1532
[link] [comments]

Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module

SnappyClient is a malware found by Zscaler that uses a custom binary protocol (encrypted and compressed) to communicate with its C&C server, with little to work with when it comes to network detection.

At Netomize, we set out to write a detection rule targeting the encrypted message packet by leveraging the unique features of PacketSmith + Yara-X detection module, and the result is documented in this blog post.

submitted by /u/MFMokbel
[link] [comments]

Vulnerability Disclosure - SCHNEIDER ELECTRIC Modicon Controllers M241 / M251 / M262

Schneider Electric has addressed two vulnerabilities disclosed by Team82 in its Modicon Controllers M241 / M251, and M262 PLC line. The vulnerabilities can allow an attacker to cause a denial-of-service condition that affects the availability of the controller.

Read more on our Disclosure Dashboard: http://claroty.com/team82/disclosure-dashboard

Or download SE's advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-069-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-069-01.pdf

submitted by /u/clarotyofficial
[link] [comments]

Why Your Brain is a Security Risk

Human thought is still evolving to handle the digital world. We act instinctively when we should act deliberately β€” and under pressure, we rarely consider all the options available to us. This article examines how we think under stress and outlines practical steps organizations can take to protect themselves

submitted by /u/untraceable-tortoise
[link] [comments]
Received β€” 23 March 2026 ⏭ /r/netsec - Information Security News & Discussion

OpenClaw CVE-2026-25253 is worse than it looks (quick security checklist)

Been digging into the OpenClaw vulnerability (CVE-2026-25253) this week.

Most people are focusing on the CVSS score (8.8), but the bigger issue is misconfigured instances + exposed skills.

Here’s a quick checklist I’ve been using:

  1. Audit all active skills (especially external ones)
  2. Lock down network exposure (a lot of instances are publicly reachable)
  3. Recheck auth flows - default configs are risky
  4. Monitor logs for abnormal agent behavior
  5. Patch immediately if you haven’t already

I wrote a more detailed breakdown here if anyone wants the full audit steps: Here

Curious- has anyone here actually seen exploitation in the wild yet?

submitted by /u/NotFunnyVipul
[link] [comments]
❌