anthropic shipped claude opus 4.7 with a new cyber classifier four days ago. hackerone pays up to $15k per universal jailbreak. one solo operator used roleplay prompts on 4.5 to exfil 150GB from the mexican government. guide drops the taxonomy. #AISecurity #RedTeam
www.toxsec.com/p/how-to-jai...
Posts by ToxSec
absolutely lol. great call out.
ever report a bug and immediately think “i should’ve saved that one for later”? #bugbounty
Caffeine intake is directly proportional to triage response time. #BugBounty #InfoSec
every time i see a 500 error, i feel like i just poked something i wasn’t supposed to. #bugbounty
spent all night fuzzing only to realize the app was down for maintenance. #bugbounty
researchers pwned claude code, gemini cli, and copilot agent with a pr title.
johns hopkins team put #prompt injection into a pull request title. the agents read it, followed it, and in claude’s case leaked what could be #credentials through the review comment.
#anthropic paid $100.
Cuckoo’s Egg Log Chase (1986) – Astronomer-turned-sysadmin Cliff Stoll traced a 75-cent accounting error to an East-German spy ring stealing U.S. military secrets; armed only with a modem and a spiral notebook. #Hackers
red team lives in kali, blue team lives in splunk, neither sleeps. #infosec
the morris worm taught everyone that “oops” can be a global event. #hackerhistory
bug bounty tip: the best findings are usually hiding behind one extra click. #bugbounty
triagers must have a folder called “not reproducible.” #bugbounty
If you had to disable one standard service on every freshly deployed server, which would it be?
#ServerManagement #TechDebate
Correlate with business logic.
Think like the app owner: can you transfer credits, bypass approvals, or alter invoices? High-impact logic flaws often sit outside classic vuln checklists. #BugBounty
The Dark Tangent’s Pager Hack (1993) – At the very first DEF CON, founder Jeff Moss demonstrated pager cloning to show how “private” beeper messages could be intercepted in real time. #Defcon
#Claude #Mythos Preview won’t be release to the general public ⚠️
only a special set of defense partners known as Project #Glasswing will get the model.
Anthropic sites an unprecedented jump in cyber capability that is dangerous to release in the current form.
anthropic.com/glasswing
bug hunting is basically speed dating with error messages. #bugbounty
If you could magically enforce one security control across the internet, what would it be?
every payload works in repeater until you show it to the triager. #bugbounty
The very first webcam (1991) pointed at a coffee pot at Cambridge so sysadmins knew when to refill it. #IT
i think bug hunting taught me more about debugging than dev ever did. #bugbounty
That moment when grep finds the secret in node_modules—and you can’t decide whether to celebrate or cry. #infosec
red teamers call it “initial access.” blue team calls it “a very bad day.” #infosec
why do all the juicy endpoints have the worst error messages? #bugbounty
An app feels safe until you examine it closely. #CyberSecurity #AppSafety
Consider the business logic: could you move credits, skip approvals, or modify invoices? Major logic flaws often lurk beyond standard vulnerability lists. #CyberSecurity
Every exposed inference endpoint is a training set for attackers.
High-volume, carefully crafted queries let them clone outputs and rehost your model.
Rate-limit, add noise, and watch for scraping signals.
#BugBounty #AIsecurity #ModelStealing
How do you keep motivation up during those endless triage silences? #Triage
nobody scans ports to hack an AI agent. one poisoned document in the RAG pipeline and the model does the rest. NVIDIA and MITRE ATLAS mapped 66+ #AISecurity attack techniques. here's where the chain breaks. #PromptInjection #MLSec
www.toxsec.com/p/ai-kill-ch...
Map first, hack second.
Use tools like amass, subfinder, or assetfinder to build a full subdomain list, then verify with httpx or httprobe. A wide, clean recon set is where 80% of finds begin. #BugBounty