What Happens When a Nuclear Site Is Hit?
Here is a draft for a Reddit post tailored for the r/homelab community.
Title: [Project] Turning a Raspberry Pi into a "Poor Man's" Enterprise IDS/NSM using Zeek and Suricata
Hey everyone,
Iβve been looking for ways to get better visibility into my network traffic without dropping $500+ on dedicated hardware or running a power-hungry 1U server 24/7. I came across this guide from HookProbe that breaks down how to deploy Zeek and Suricata on a Raspberry Pi (specifically optimized for the Pi 4/5), and I thought it would be right up this sub's alley.
Link: Deploying Zeek and Suricata on Raspberry Pi for Edge Security
Why this is cool for a Homelab:
The Setup: The guide walks through the /etc configurations for both tools. If youβre like me and love structured logs (DNS queries, SSL handshakes, HTTP headers) for your ELK stack or Grafana dashboards, Zeek is a goldmine.
Some questions for the community:
Iβm planning to set this up this weekend to feed into my local SOC dashboard. If you're looking for a low-cost way to move past "just a basic firewall," this seems like a solid weekend project.
Curious to hear if anyone has tried a similar "Edge Security" approach!
Built a free red team arena for testing real attack paths against a live defense system for ShieldNet DLX7.
This is NOT a CTF or a static lab. It actually responds to what you do.
Current scenarios:
Everything runs in a sandbox. No production targets. Novel attacks generate detection rules that get reviewed and pushed into the system
If you want to test how your payloads actually hold up against modern defenses, this is useful.
Researcher Yarden Porat (Cyata) disclosed a vulnerability chain in CrewAI, the widely-used Python multi-agent framework. CERT/CC advisory VU#221883. No full patch released yet.
The chain:
CVE-2026-2275 β Code Interpreter silently falls back to SandboxPython when Docker is unavailable. SandboxPython allows arbitrary C function calls β RCE.
CVE-2026-2287 β CrewAI does not continuously verify Docker availability during runtime. An attacker who triggers the fallback mid-execution lands in the vulnerable sandbox.
CVE-2026-2285 β JSON loader tool reads files without path validation. Arbitrary local file read.
CVE-2026-2286 β RAG search tools don't validate runtime URLs β SSRF to internal services and cloud metadata endpoints.
Attack entry point: prompt injection against any agent with Code Interpreter Tool enabled. The attacker doesn't need code execution access to the host β they just need to reach the agent with crafted input.
Scope: Any CrewAI deployment running Code Interpreter Tool where Docker is not guaranteed to be available (or can be disrupted). Default "unsafe mode" config is fully exposed.
Current status: CrewAI maintainers are working on mitigations (fail closed instead of fallback, block C modules, clearer warnings). Not released. No CVSSv3 scores published yet.
Has anyone tested whether the Docker availability check can be disrupted mid-execution in a containerized deployment, or does that attack path require an already-degraded environment?
On March 24, 2026, Mercor AI was reportedly affected by a breach linked to the hacking group Lapsus$. The incident is believed to have originated from a supply chain attack involving a compromised LiteLLM package, which may have been inadvertently pulled by one of Mercorβs AI agents.
Through this vector, attackers allegedly gained access to internal systems, including Tailscale VPN credentials, and exfiltrated approximately 4TB of data. The leaked data reportedly included 211GB of candidate records, 939GB of source code, and around 3TB of video interviews and identity documents.
In a public statement on X (formerly Twitter), Mercor said that it had identified itself as one of many companies impacted by the LiteLLM supply chain attack. The company added that its security team acted quickly to contain the breach and begin remediation efforts. Possible attack chain pathway linked.