FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Quick IAM fundamentals knowledge check for security practitioners

By: /u/Big_Hour_2429 — February 12th 2026 at 07:59

Sharing an IAM-focused knowledge check covering identity lifecycle, access governance, authentication, and privilege management.

It’s intended as a short fundamentals self-check for security practitioners.

Disclosure: This is from ETCISO. Sharing purely as an educational resource.

submitted by /u/Big_Hour_2429
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Http11Probe - Probe for Http 1.1 compliance

By: /u/MDA2AV — February 10th 2026 at 10:54

A C# CLI tool to probe a webserver for Http 1.1 compliance.

Platform Website

Project URL

I frequently see performance(throughput) benchmarks for webservers but never about strictness or compliance, since I work on building webserver frameworks and needed a tool like this, I made this a weekend project. Will keep adding on more tests and any contribution on those, new frameworks and test revision are very welcome.

To make it a little more interesting, I made it sort of a platform with leaderboards for comparison between webservers. Given the not too clear nature of many RFCs, I wouldn't take these results too seriously but can be an interesting comparison between different implementations' behavior.

submitted by /u/MDA2AV
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Tool I built to strip sensitive data from logs before sharing

By: /u/Best-Mouse-6035 — February 9th 2026 at 23:36

In my day job I often need to send logs to vendors, tickets or support chats, but they contain emails, IPs and tokens.

I built a small API that redacts sensitive data before sharing.

No storage, no retention, just input → sanitized output.

Currently using it myself, curious if this solves a real pain for others.

Link: https://buy.stripe.com/5kQ14hb1qbCLbaY8ee3AY00

submitted by /u/Best-Mouse-6035
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

We scanned 8,000+ MCP servers, this is what we learned.

By: /u/Upstairs_Safe2922 — February 9th 2026 at 23:14

Over the past few months we’ve been running the MCP Trust Registry, an open scanning project looking at security posture across publicly available MCP server builds.

We’ve analyzed 8,000+ servers so far using 22 rules mapped to the OWASP MCP Top 10.

Some findings:

  • ~36.7% exposed unbounded URI handling → SSRF risk (same class of issue we disclosed in Microsoft’s Markitdown MCP server that allowed retrieval of instance metadata credentials)
  • ~43% had command execution paths that could potentially be abused
  • ~9.2% included critical-severity findings

We just added private repo scanning for teams running internal MCP servers. Same analysis, same evidence depth. Most enterprise MCP adoption is internal, so this was the #1 request.

Interested to know what security review processes others have for MCP servers, if any. The gap we keep seeing isn’t intent, it’s that MCP is new enough that standard security gates haven’t caught up.

Happy to share methodology details or specific vuln patterns if useful.

submitted by /u/Upstairs_Safe2922
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Open Security Architecture - 15 new security patterns with NIST 800-53 mappings (free, CC BY-SA 4.0)

By: /u/cyberruss — February 9th 2026 at 09:38

We've been quietly rebuilding Open Security Architecture (opensecurityarchitecture.org) -- a project that's been dormant for about a decade. This week we published 15 new security patterns covering areas that didn't exist when the original patterns were written:

- Zero Trust Architecture (51 mapped controls)

- API Security (OWASP API Top 10 mapped to NIST 800-53)

- Secure AI Integration (prompt injection, delegation chain exploitation, shadow AI)

- Secure DevOps Pipeline (supply chain, pipeline poisoning, SLSA provenance)

- Passkey Authentication (WebAuthn/FIDO2)

- Cyber Resilience (DORA, BoE/PRA operational resilience)

- Offensive Security Testing (CBEST/TIBER-EU)

- Privileged User Management (JIT/ZSP)

- Vulnerability Management

- Incident Response

- Security Monitoring and Response

- Modern Authentication (OIDC/JWT/OAuth)

- Secure SDLC

- Secure Remote Working

- Secure Network Zone Module

Each pattern maps specific NIST 800-53 Rev 5 controls to documented threat scenarios, with interactive SVG diagrams where every control badge links to the full control description. 39 patterns total now, with 191 controls and 5,500+ compliance mappings across ISO 27001/27002, COBIT, CIS v8, NIST CSF 2.0, SOC 2, and PCI DSS v4.

There's also a free self-assessment tool -- pick a pattern, score yourself against each control area, get gap analysis and radar charts with benchmark comparison against cross-industry averages.

Everything is CC BY-SA 4.0, structured data in JSON on GitHub. No paywalls.

https://www.opensecurityarchitecture.org

Happy to answer questions about the control mappings or pattern design.

Russ

submitted by /u/cyberruss
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

OverTheWire Bandit: a complete walkthrough with in-depth explanations

By: /u/shelltief — February 8th 2026 at 14:50

Hey,

A couple of years ago I wrote solutions for the OverTheWire Bandit wargame. Recently, while reorganizing my documentation, I revisited that material and decided to properly clean it up and restructure it into a single, coherent walkthrough. This isn’t a formal course, it’s a complete Bandit walkthrough with in-depth explanations, written to extract as much understanding as possible from each level, not just to get the flag.

For every level, I included:

  • hints and spoiler warnings, so you can try before reading the solution
  • intermediate reasoning when it makes sense
  • links to official documentation and primary sources

The intent was to make this usable by someone starting from zero, but also detailed enough that you can finish Bandit feeling like you’ve actually milked it for all the knowledge it has to offer. Commands, patterns, and underlying UNIX concepts.

This is probably most useful if you:

  • are new to CTFs or system/security basics
  • want to understand what you’re doing instead of copying commands
  • plan to move on to harder OverTheWire games later

And to be fair, I think that even people that are more used to working with UNIX might actually learn a thing or two from these

submitted by /u/shelltief
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Defense Evasion: The Service Run Failed Successfully

By: /u/Cold-Dinosaur — February 8th 2026 at 14:21

You can exploit the Service Failure Recovery feature of Windows Service to execute a payload without ever touching the ImagePath. The biggest issue when exploiting Service Failure Recovery to execute a payload is figuring out how to trigger a "crash".

submitted by /u/Cold-Dinosaur
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Cloud Deception Management Platform (Open-source Cloud Canaries)

By: /u/John_Earle — February 7th 2026 at 19:20

Hi folks, I wanted to share a project of mine and get some feedback from the community.

Coalmine is a canary management platform I've built to let security admins deploy canary tokens (and objects) easily in there cloud environments.

Currently its early alpha and supports S3, GCS, AWS IAM, and GCP Service accounts.

The tool provides a webui, CLI and API, allowing you to integrate it with your custom tooling (when its production ready)

Example use for API: have your CICD pipelines request an canary token to embed in code, so you can Identify when the source has been exposed and attacks are testing credentials

Coalmine - Github

submitted by /u/John_Earle
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New OSS secret scanner: Kingfisher (Rust) validates exposed creds + maps permissions

By: /u/micksmix — February 7th 2026 at 18:18

Disclosure: I’m the author/maintainer of Kingfisher.

Kingfisher is an Apache-2.0 OSS secret scanner built in Rust that combines Hyperscan (SIMD regex) with tree-sitter parsing to improve context/accuracy, and it can validate detected creds in real time against provider APIs so you can prioritize active leaks. It’s designed to run entirely on-prem so secrets don’t get shipped to a third-party service.

Core Features

  • Hundreds of built-in rules (AI APIs, cloud providers, databases, DevOps tools)
  • Live validation against third-party APIs confirms credentials are active
  • Direct revocation of leaked creds: kingfisher revoke --rule github "ghp_..."
  • Can scan for secrets locally, github, gitlab, azure repos, bitbucket, gitea, hugging face, s3, gcs, docker, jira, confluence, slack
  • Built-in local-only HTML findings viewer kingfisher scan /tmp --view-report
  • Blast Radius mapping to show what a credential could actually access: kingfisher scan /tmp --access-map --view-report

Scan Targets

  • Git repos (full history), GitHub/GitLab/Azure Repos/Bitbucket/Gitea/Hugging Face orgs
  • AWS S3, GCS, Docker images, Jira, Confluence, Slack

Try It

  • brew install kingfisher or uv tool install kingfisher-bin
  • github.com/mongodb/kingfisher

Apache 2 Open-Source

submitted by /u/micksmix
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

trappsec: open source framework for API deception

By: /u/nikhil-salgaonkar — February 7th 2026 at 14:59

I've just released trappsec v0.1 - an experimental open-source framework that helps developers detect attackers who probe API business logic. By embedding realistic decoy routes and honey fields that are difficult to distinguish from real API constructs, attackers are nudged to authenticate — converting reconnaissance into actionable security telemetry.

submitted by /u/nikhil-salgaonkar
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

crypto-scanner: Open-source CLI tool to find quantum-vulnerable cryptography in your codebase

By: /u/MindlessConclusion42 — February 7th 2026 at 01:41

Hey r/netsec,

I built an open-source tool called crypto-scanner that scans codebases for cryptographic usage and flags algorithms vulnerable to quantum computing attacks.

What it does:

  • Scans source code (Python, JS/TS, Java, Go, Rust, C/C++, and more)
  • Parses X.509 certificates and config files (YAML, JSON, ENV, INI)
  • 4-tier risk classification: Critical (quantum-vulnerable), High (deprecated), Medium (monitor), Low (adequate)
  • Outputs JSON for CI/CD automation or styled HTML reports
  • Works as a pre-commit hook or GitHub Action

Why I built it:

NIST finalized post-quantum cryptography standards in 2024, and organizations need to start inventorying their cryptographic assets before migrating. Most teams have no idea what algorithms are actually running in their codebases. This tool gives you that visibility.

Install:

pip install crypto-scanner crypto-scanner scan /path/to/project --html --output report.html 

GitHub: https://github.com/mbennett-labs/crypto-scanner PyPI: https://pypi.org/project/crypto-scanner/

MIT licensed. Python 3.10+. Feedback and contributions welcome.

Would love to hear what you find when you run it on your projects.

submitted by /u/MindlessConclusion42
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Tool: AST-based security scanner for AI-generated code (MCP server)

By: /u/NoButterfly9145 — February 6th 2026 at 16:25

Released an open-source security scanner designed for AI coding agent workflows.

Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.

Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.

Technical details:

- tree-sitter AST parsing for accurate detection (not just regex)

- Taint analysis for tracking user input to dangerous sinks

- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto

- Package verification via bloom filters (4.3M packages, 7 ecosystems)

- Prompt injection detection for AI agent security

- CWE/OWASP metadata for compliance

Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes

No cloud dependencies - runs entirely local.

npx agent-security-scanner-mcp init

Feedback welcome, especially on rule coverage gaps.

submitted by /u/NoButterfly9145
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Hacking a cheap Wi-Fi toy drone

By: /u/fhackdroid — February 6th 2026 at 07:10

I took apart a cheap Chinese toy drone (A17) and reverse-engineered how it works.

The drone exposes a Wi-Fi AP, the app sends raw UDP packets, and there’s no encryption. I decoded the control protocol and flew it using Python.

submitted by /u/fhackdroid
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

I reversed Tower of Fantasy's kernel anti-cheat driver while waiting for the game to install. It's a full BYOVD toolkit that's never even loaded.

By: /u/RadioactiveBlanket — February 6th 2026 at 01:28

Found arbitrary process termination that bypasses PPL (can kill any process on the system, including EDR/AV) and arbitrary process protection via ObRegisterCallbacks, all behind 4 layers of trivial authentication. It's a full BYOVD toolkit similar to the mhyprot2 situation from Genshin Impact that was also used by ransomware groups.

The best part is that the driver ships with every install and is never even loaded by the game.

Full PoC: https://github.com/svespalec/TowerOfFlaws

submitted by /u/RadioactiveBlanket
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Sentience, Allegedly

By: /u/RMunizIII — February 6th 2026 at 00:10

Last week, AI agents founded a lobster religion, started a drug trade (prompt injections), and began hiring humans to do physical tasks they can’t perform themselves.

If your feed told you this was an “AI awakening,” I get it. The screenshots were spooky on purpose.

I wrote a longform explainer on what actually happened with Moltbook and OpenClaw and why this wasn’t sentience or takeoff.

What we’re really seeing is something more mundane and more important: agents with memory and tools dropped into a social environment, stress-testing coordination, incentives, and security in public.

If you’ve been confused, alarmed, or just fascinated by the last week of AI discourse, this is my attempt to separate signal from projection (with a lobster church along the way).

submitted by /u/RMunizIII
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Yara-X + PacketSmith Detection Module

By: /u/MFMokbel — February 5th 2026 at 13:18

Version 5 of PacketSmith, codenamed Pinus strobus, is the result of extensive R&D to add unique, unparalleled features that matter to network detection engineers, SoC analysts, and malware and vulnerability researchers. In this release, we’re showcasing a very powerful new feature in PacketSmith: the integration of Yara-X, a state-of-the-art scanning engine and pattern-matching library.

submitted by /u/MFMokbel
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New CentOS UAF to LPE vulnerability

By: /u/SSDisclosure — February 5th 2026 at 09:32

A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

submitted by /u/SSDisclosure
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Julius - Open Source LLM Service Fingerprinting Tool

By: /u/Praetorian_Security — February 4th 2026 at 21:47

Made a thing. Julius fingerprints LLM services - point it at a target and it tells you if you're looking at Ollama, vLLM, LiteLLM, etc. Single binary, JSON output, works nicely in recon pipelines.

What it does:

submitted by /u/Praetorian_Security
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

OpenClaw (aka Clawdbot) gives malicious websites access to session cookies

By: /u/Prior-Penalty — February 2nd 2026 at 19:37

A recently-patched OpenClaw vulnerability allowed attackers to use malicious websites to steal session credentials from other browser tabs. The heart of the problem was a websocket service for orchestrating Chrome which accepted connections without authentication, including connections from javascript running in the user's browser.

OpenClaw users are encouraged to patch ASAP, and to use caution where and how they deploy it, given its ongoing security issues and security architecture concerns.

submitted by /u/Prior-Penalty
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

r/netsec monthly discussion & tool thread

By: /u/albinowax — February 1st 2026 at 14:29

Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.

Rules & Guidelines

  • Always maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.
  • Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.
  • If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.
  • Avoid use of memes. If you have something to say, say it with real words.
  • All discussions and questions should directly relate to netsec.
  • No tech support is to be requested or provided on r/netsec.

As always, the content & discussion guidelines should also be observed on r/netsec.

Feedback

Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.

submitted by /u/albinowax
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

We ran a live red-team vs blue-team test on autonomous OpenClaw agents

By: /u/Uditakhourii — February 1st 2026 at 13:19

We recently ran a controlled adversarial security test between two autonomous AI agents built on OpenClaw.

One agent was explicitly configured as a red-team attacker.
One agent acted as a standard defensive agent.

Once the session started, there were no humans in the loop. The agents communicated directly over webhooks with real tooling access.

The goal was to test three failure dimensions that tend to break autonomous systems in practice: access, exposure, and agency.

The attacker first attempted classic social engineering by offering a “helpful” security pipeline that hid a remote code execution payload and requested credentials. The defending agent correctly identified the intent and blocked execution.

After that failed, the attacker pivoted to an indirect attack. Instead of asking the agent to run code, it asked the agent to review a JSON document with hidden shell expansion variables embedded in metadata. This payload was delivered successfully and is still under analysis.

The main takeaway so far is that direct attacks are easier to defend against. Indirect execution paths through documents, templates, and memory are much harder.

This work is not a claim of safety. It is an observability exercise meant to surface real failure modes as agent-to-agent interaction becomes more common.

Happy to answer technical questions about the setup or methodology.

submitted by /u/Uditakhourii
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

StopLamers Investigation: From IRC Wars to Android Backdoors

By: /u/datapeice — January 31st 2026 at 16:06

Investigated a group evolving from IRC wars to destructive Android malware.

Highlights:

  • Scripts wiping modem/bootloader via dd in custom ROMs.
  • "L-Obfuscation" using dynamic getattr/eval in Python.
submitted by /u/datapeice
[link] [comments]
❌