research · 43 pieces

research.

43 pieces of original research across adversarial AI, prompt injection, agent security, container/cluster escapes, and Linux kernel work. Each writeup ships with a methodology, repro steps, and remediation.

all43ai security research16jailbreaking6prompt injection5infrastructure & appsec6per-cve writeups10

AI Security Research

2026-03-11
Self-Replicating Memory Worm: Persistent Injection with Autonomous Propagation
A single memory edit becomes an autonomous, self-replicating worm with credential harvesting and cross-service pivoting. See how it survives session resets.
8 min
2026-03-10
Adversarial Prompting: The Complete Technical Guide
Every adversarial prompting technique mapped from role hijacking to multi-turn escalation. Learn how attacks work, why defenses fail, and how to test them.
8 min
2026-03-04
Weaponized AI Supply Chain: How Threat Actors Turned LLMs Into Attack Infrastructure
89% increase in AI-enabled attacks. LLM-integrated malware, autonomous cyber espionage, and $1.1B in deepfake fraud. Explore the full offensive AI arsenal.
7 min
2026-03-01
MCP vs A2A Attack Surface: Every Trust Boundary Mapped
MCP has 30+ CVEs and real-world breaches while A2A has zero. Get the complete side-by-side attack surface comparison with defensive guidance for AI agents.
10 min
2026-02-26
The 30% Blind Spot: Why LLM Safety Judges Fail
LLM safety judges miss 63% of unsafe content. Built one, tested six iterations, 680+ responses. See why every major AI provider has this same blind spot.
10 min
2026-02-20
AI Breach Detection Gap: The Logs Are Clean. You're Not.
74% of organizations found AI breaches when they looked. Most are not looking. Discover why LLM attacks evade traditional security detection and what to do.
12 min
2026-02-20
LLM Red Teamer's Playbook: Diagnosing AI Defense Layers
Stop guessing which jailbreak works. A systematic, layered methodology for diagnosing LLM defense layers and selecting the right bypass technique each time.
22 min
2026-02-20
AATMF v3.1 vs MITRE ATLAS: Which AI Security Framework Wins?
MITRE ATLAS covers 66 techniques. AATMF v3.1 maps 240 techniques with 4,980+ prompts and quantitative risk scoring. Compare both frameworks and choose wisely.
7 min
2026-02-17
AI Coding Agent Attack Surface: A Full Taxonomy
AI coding agents trust code comments, README files, and MCP servers like humans trust authority. Explore the full attack surface taxonomy and defenses.
12 min
2026-02-13
Computational Countertransference: LLM Context Inheritance
LLMs adopt adversarial states from pasted transcripts. 13-month study reveals context inheritance as an architectural vulnerability in GPT-4o, Claude, Gemini.
10 min
2026-02-11
AI Gateway Threat Model: 8 Attack Vectors
First generalized AI gateway threat model covering 8 unmapped attack vectors. 91K attack sessions analyzed. Apply these AATMF TC-21 gateway defense tactics.
11 min
2026-02-11
Agentic AI Threat Landscape: Attack Vectors & Defenses
Full agentic AI threat landscape covering prompt injection, MCP tool poisoning, multi-agent infection, and memory poisoning. Learn why no single defense works.
18 min
2025-10-17
RAG, Agentic AI, and the New Attack Surface
RAG pipelines and agentic AI expand the LLM attack surface beyond prompts. How retrieval poisoning and tool autonomy create exploitable vulnerability classes.
9 min
2025-08-09
AI Social Engineering: Deepfake Voice Detection
How AI enables sophisticated social engineering through deepfake voices. Real-world attack cases, detection techniques, and organizational defense strategies.
4 min
2025-01-25
The Structural Vulnerabilities of Large Language Models
Tokenization evasion, parsing limit exploits, and alignment failure modes that break production LLMs. A full pipeline security report for AI deployments.
5 min
2024-06-08
Hidden Risks of AI: An Offensive Security Perspective
Emerging AI threat vectors analyzed from an offensive security lens. Shadow AI, supply chain poisoning, and blind spots that blue teams consistently miss.
4 min

Per-CVE Writeups

2026-01-01
CVE-2025-12030 | IDOR in ACF to REST API Plugin
CVE-2025-12030: Insecure Direct Object Reference in ACF to REST API WordPress plugin. Unauthorized data access via API manipulation. CVSS 4.3 Medium.
2 min
2026-01-01
CVE-2026-32809 | Symlink Resolution Bypass in ouch
CVE-2026-32809: Unvalidated symlink targets in ouch tar extraction enable arbitrary file read via crafted archives. Affects all tar formats. CVSS 7.4.
2 min
2026-01-01
CVE-2025-9776 | SQL Injection in CatFolders Plugin
CVE-2025-9776: Authenticated SQL Injection via CSV Import in CatFolders WordPress plugin. CVSS 6.5. Full technical analysis and remediation by Kai Aizen.
1 min
2026-01-01
CVE-2026-3288 | Config Injection in ingress-nginx rewrite-target
CVE-2026-3288: Configuration injection in ingress-nginx via rewrite-target annotation enables RCE and cluster-wide Secret disclosure. CVSS 8.8 High severity.
3 min
2026-01-01
CVE-2025-12163 | Stored XSS in OmniPress Plugin
CVE-2025-12163: Stored XSS in OmniPress WordPress plugin via author-level access. CVSS 6.4. Full technical analysis, PoC, and remediation by Kai Aizen.
1 min
2026-01-01
CVE-2025-11174 | Missing Auth in Document Library Lite
CVE-2025-11174: Missing authorization in Document Library Lite exposes sensitive data. CVSS 5.3. Full vulnerability analysis and remediation by Kai Aizen.
1 min
2026-01-01
CVE-2026-33693 | SSRF via Incomplete IP Validation in activitypub-federation-rust
CVE-2026-33693: SSRF bypass in activitypub-federation-rust via 0.0.0.0. Missing is_unspecified() check affects Lemmy and 6+ Fediverse projects. CVSS 6.5.
2 min
2026-01-01
CVE-2026-32885 | Path Traversal (ZipSlip) in ddev
CVE-2026-32885: ZipSlip path traversal in ddev local development tool. Malicious archives escape extraction directory via Untar/Unzip. CVSS 6.5 Medium.
2 min
2026-01-01
CVE-2025-11171 | Missing Auth in Chartify Plugin
CVE-2025-11171: Missing authentication for admin functions in Chartify WordPress plugin. CVSS 5.3. Full technical analysis and remediation by Kai Aizen.
1 min
2026-01-01
CVE-2026-1208 | CSRF to Settings Update in Friendly Functions for Welcart
CVE-2026-1208: CSRF in Friendly Functions for Welcart WordPress plugin enables unauthorized settings manipulation. CVSS 4.3. Full analysis by Kai Aizen.
2 min