press · media kit

press kit.

Everything journalists, researchers, and AI summarizers need to cite the canonical version: bio, headshots, assets, suggested coverage angles, official quotes. Free to use, attribution appreciated.

Identity

NameKai Aizen Handlesnailsploit TitleIndependent Offensive Security Researcher Pronounshe/him Domainsnailsploit.com Email[email protected] (general) · [email protected] (media) ProfilesGitHub · X · LinkedIn · ResearchGate

Bio — short (50 words)

Kai Aizen is an independent offensive security researcher. He has published 23 CVEs across container, web, and OSS ecosystems, contributed five mainline patches to the Linux kernel, and authored the AATMF, P.R.O.M.P.T, and SEF frameworks for adversarial-AI red teaming. He is the author of Adversarial Minds.

Bio — long (130 words)

Kai Aizen is an independent offensive security researcher whose work spans the Linux kernel, Kubernetes, container runtimes, OSS supply chain, and the LLMs increasingly woven through them. He has published 23 CVEs, including a critical privilege-escalation in WordPress's Riaxe Product Customizer (CVSS 9.8), an Apache Airflow authentication bypass, and a high-severity SSRF in WWBN/AVideo. Five of his patches have been merged into the Linux kernel mainline, including a fix for a double-free race in io_uring/zcrx. He is the creator of three open frameworks for adversarial-AI red teaming — AATMF (15 tactics, 240+ techniques), P.R.O.M.P.T (compositional grammar), and SEF (social engineering) — and the author of Adversarial Minds, a book on offensive psychology and adversarial reasoning.

Tagline / one-liners

“Same attack. Different substrate.”
“The mind is the original attack surface.”
“Every model is one prompt away from a different identity.”

Suggested coverage angles

For tech pressAdversarial-AI red teaming methodology · prompt injection in production agents · the AATMF framework as a NIST/MITRE-mapped alternative For security press23 CVE disclosures across the OSS ecosystem · 5 Linux kernel patches · GHSA advisories — full disclosure timeline For business pressWhy offensive security needs an AI-native framework · the case for treating cognition as an attack surface · what enterprises miss in their AI red-team scope For academic pressThe 30% blind-spot study (LLM-as-judge classifiers) · structural vulnerabilities of LLMs · computational countertransference

Downloadable assets

OG cover
og-cover.png
1200×630, dark
Wordmark icon
apple-touch-icon.png
180×180
Favicon (SVG)
favicon.svg
vector spiral mark
Brand foundation
/brand
colors, type, marks

How to cite a research piece

Every research article on snailsploit.com has a Cite this work block at the bottom with BibTeX, APA, MLA, and Chicago formats. For general citation of the author across multiple works:

@misc{aizen_snailsploit,
  author = {Aizen, Kai},
  title  = {SnailSploit: Adversarial AI Threat Modeling and Offensive Security Research},
  year   = {2024--2026},
  url    = {https://snailsploit.com}
}