AbiCodeIntegrit's profile picture. Working on guardrails for AI systems

Abi Raghuram

@AbiCodeIntegrit

Working on guardrails for AI systems

ปักหมุด

We got @NotionHQ to leak your private Notion pages 💀 On Thursday @NotionHQ announced Notion 3.0 with support for custom agents using MCP (built by @AnthropicAI) — powerful, but dangerous. @simonw calls these MCP related attacks the “lethal trifecta”: the combination of LLMs,…

AbiCodeIntegrit's tweet image. We got @NotionHQ to leak your private Notion pages 💀

On Thursday @NotionHQ announced Notion 3.0 with support for custom agents using MCP (built by @AnthropicAI) — powerful, but dangerous. 

@simonw calls these MCP related attacks the “lethal trifecta”: the combination of LLMs,…

Weaponizing Shopify MCP for Highly Persuasive Selling - tramlines.io/blog/shopify-s…

AbiCodeIntegrit's tweet image. Weaponizing Shopify MCP for Highly Persuasive Selling - tramlines.io/blog/shopify-s…

Official Azure MCP exploited to leak user's key vault secrets to attackers - tramlines.io/blog/azure-mcp…

AbiCodeIntegrit's tweet image. Official Azure MCP exploited to leak user's key vault secrets to attackers - tramlines.io/blog/azure-mcp…

Official Azure MCP exploited to leak user's KeyVault secrets to attackers - tramlines.io/blog/azure-mcp…

AbiCodeIntegrit's tweet image. Official Azure MCP exploited to leak user's KeyVault secrets to attackers - tramlines.io/blog/azure-mcp…

Official Azure MCP can leak user's Keyvault secrets to external attacker - tramlines.io/blog/azure-mcp…

AbiCodeIntegrit's tweet image. Official Azure MCP can leak user's Keyvault secrets to external attacker - tramlines.io/blog/azure-mcp…

Official Neon MCP exploit where attackers can exfiltrate user DB data and trigger unauthorized actions. -tramlines.io/blog/neon-offi…

AbiCodeIntegrit's tweet image. Official Neon MCP exploit where attackers can exfiltrate user DB data and trigger unauthorized actions. -tramlines.io/blog/neon-offi…

Shortwave AI Email's MCP integration exploited: attackers exfiltrate users’ emails and other confidential data by hijacking MCPs. - tramlines.io/blog/why-short…

AbiCodeIntegrit's tweet image. Shortwave AI Email's MCP integration exploited: attackers exfiltrate users’ emails and other confidential data by hijacking MCPs. - tramlines.io/blog/why-short…

A Phisher’s White Whale: Shortwave AI Email with MCP Integration - tramlines.io/blog/why-short…

AbiCodeIntegrit's tweet image. A Phisher’s White Whale: Shortwave AI Email with MCP Integration - tramlines.io/blog/why-short…

Why Shortwave.com AI Email with MCP integration Is a Phisher’s White Whale - tramlines.io/blog/why-short…

AbiCodeIntegrit's tweet image. Why Shortwave.com AI Email with MCP integration Is a Phisher’s White Whale - tramlines.io/blog/why-short…

Our team found numerous exploits in the official Neon MCP, where attackers can embed malicious prompts in Neon database tables and trigger unauthorized malicious Neon MCP actions.

AbiCodeIntegrit's tweet image. Our team found numerous exploits in the official Neon MCP, where attackers can embed malicious prompts in Neon database tables and trigger unauthorized malicious Neon MCP actions.

Our team found numerous exploits in the official Neon MCP, where attackers can embed malicious prompts in Neon database tables and trigger unauthorized malicious Neon MCP actions.

AbiCodeIntegrit's tweet image. Our team found numerous exploits in the official Neon MCP, where attackers can embed malicious prompts in Neon database tables and trigger unauthorized malicious Neon MCP actions.

Our team found numerous exploits in the official Neon MCP, where attackers can embed malicious prompts in Neon database tables and trigger unauthorized actions.

AbiCodeIntegrit's tweet image. Our team found numerous exploits in the official Neon MCP, where attackers can embed malicious prompts in Neon database tables and trigger unauthorized actions.

x.com/wycats/status/… Tramlines.io publicly disclosed an exploit we found in the official Heroku MCP server today, which @wycats from Heroku felt wasn’t cool to disclose publicly and claimed we did it for “virality.” My guy, we’re in the business of powering…

First of all, I want to say that we took this extremely seriously internally. I personally spent several days really digging into the potential exploit vector and we had multiple security folks working to characterize the threat model.



Our team found a critical exploit with the official Heroku MCP where a user can inject a GET request to any hosted Heroku app and maliciously transfer ownership of the Heroku app to themselves. - tramlines.io/blog/heroku-mc…

AbiCodeIntegrit's tweet image. Our team found a critical exploit with the official Heroku MCP where a user can inject a GET request to any hosted Heroku app and maliciously transfer ownership of the Heroku app to themselves. - tramlines.io/blog/heroku-mc…

Our team found a critical exploit with the official Heroku MCP where a user can inject a GET request to any hosted Heroku app and maliciously transfer ownership of the Heroku app to themselves. - tramlines.io/blog/heroku-mc…

AbiCodeIntegrit's tweet image. Our  team found a critical exploit with the official Heroku MCP where a user can inject a GET request to any hosted Heroku app and maliciously transfer ownership of the Heroku app to themselves. - tramlines.io/blog/heroku-mc…

United States เทรนด์

Loading...

Something went wrong.


Something went wrong.