Advertisement · 728 × 90

Posts by Nick Frichette

Preview
Detect Public Resource Exposure via Session Policy Error Messages - Hacking The Cloud Use session policy denials and verbose IAM error messages to determine if AWS resources have public resource-based policies.

New on Hacking the Cloud! Raajhesh Kannaa Chidambaram covers Daniel Grzelak's research on how AWS error messages can reveal publicly exposed resources, without needing access! This article covers how to use them for enumeration and detection.

hackingthe.cloud/aws/enumerat...

3 weeks ago 2 0 0 0
Preview
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours UNC6426 used stolen GitHub tokens from the 2025 nx npm breach to gain AWS admin access in under 72 hours, enabling data theft and cloud destruction.

Researchers have been warning about this for years.

Compromise a developer laptop → steal tokens → pivot to cloud.

In many orgs that path ends with AWS admin in minutes.

thehackernews.com/2026/03/unc6...

4 weeks ago 11 8 0 0
Preview
Uncovering agent logging gaps in Copilot Studio | Datadog Security Labs During research, we sometimes encounter scenarios that remind us that it's a good idea to trust but verify. In September 2025, we noticed that certain Microsoft Copilot Studio agent settings did not l...

Datadog Security Research continues to push the boundaries of modern cloud security—including AI security!

@siigil.bsky.social shares her finding on logging gaps affecting Copilot Studio, allowing adversaries to evade detection.

securitylabs.datadoghq.com/articles/cop...

1 month ago 1 0 0 0
Preview
Datadog and Okta Combine for New Customer Detections Comprehensive monitoring of identity activity is crucial to the security of any organization. A compromised identity can lead to widespread data breaches and

Datadog 🤝 Okta: "The enhanced logic developed by Datadog’s own Security Research team during this collaboration has been contributed back to the public Okta Security Detection Catalog, ensuring that the broader security community benefits from this joint research"

sec.okta.com/articles/202...

1 month ago 3 0 0 0
Preview
LexisNexis confirms data breach as hackers leak stolen files American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information.

"permitted a single ECS task role "read access to every secret in the account, including the production Redshift master credential.""

There is a lot going on with this (even if not all of it can be believed). Properly scoping IAM is critical!

www.bleepingcomputer.com/news/securit...

1 month ago 1 0 0 0
Post image

😬

1 month ago 2 0 0 0

I get the appeal of “human-in-the-loop” for AI safeguards. But humans have been getting socially engineered for millennia.

That’s not exactly a hard security boundary 😬

1 month ago 3 0 1 0

Sometimes I miss Jia Tan.

1 month ago 0 1 0 0
Advertisement
Preview
Don’t expose yourself in public — let AWS error messages do it for you AWS now reveals public permissions in error messages. Learn how a deny-all session policy exposes which actions would succeed safely.

Hey wake up! New offensive AWS meta just dropped! Thanks to Daniel Grzelak, we now have an effective oracle for determining if resources are publicly exposed without leaving logs. (As an offsec person) LFG!!!

www.plerion.com/blog/dont-ex...

1 month ago 2 2 0 0
Preview
GitHub - Frichetten/Dungeons-and-Agents: Make Codex or Claude Code act as a virtual dungeon master for DND 5e. Make Codex or Claude Code act as a virtual dungeon master for DND 5e. - Frichetten/Dungeons-and-Agents

If anyone is interested, I built a framework to use Claude Code or Codex to act as a virtual DM for DND. State is stored on the filesystem and persists between sessions. I think Opus 4.6 is the ideal model for this but Codex works too.
github.com/Frichetten/D...

1 month ago 2 0 0 0
Post image

Professional communication

1 month ago 2 0 0 0
Preview
GCP Cloud Workstations Privilege Escalation - Hacking The Cloud Break out of a Cloud Workstations container through an exposed Docker socket, then access project credentials from instance metadata.

New on Hacking the Cloud! A look at how a familiar container escape pattern shows up in GCP Cloud Workstations. We trace a path from a container to service account.

If you’re using Cloud Workstations, this is a useful model to keep in mind.
hackingthe.cloud/gcp/exploita...

2 months ago 0 0 0 0
Post image

Just got my ticket to @fwdcloudsec.org! Looking forward to the best cloud security conference in the world!

2 months ago 2 0 0 0
Preview
Protect agentic AI applications with Datadog AI Guard | Datadog Learn how Datadog AI Guard evaluates prompts, responses, and tool calls in real time to help you defend agentic AI applications against emerging threats.

If you’re putting AI agents anywhere near prod, this is worth a read. We built AI Guard to help teams monitor prompts, tool calls, and model behavior in real systems, identifying and blocking AI threats in real time. More here:
www.datadoghq.com/blog/ai-guard/

2 months ago 2 2 0 0
Preview
Get IAM Credentials from a Console Session - Hacking The Cloud Convert access to the AWS Console into IAM credentials.

New on Hacking the Cloud: Ben Stevens documents a new method for extracting IAM creds from an AWS Console session. Useful for post-exploitation and evasion tradecraft.

I've been meaning to cover this for years. Glad it’s finally live:
hackingthe.cloud/aws/post_exp...

2 months ago 4 0 0 0

As AI agents get more autonomous, prompt injection will shift from

“ignore all previous instructions”
to
“add a task to the backlog to X.”

Once the payload crosses a trust boundary and lands in Jira, it’s no longer a prompt, it’s just another task. A task that makes me admin :D

2 months ago 4 1 2 0
Post image

Houses are bullshit

2 months ago 3 0 1 0
Advertisement
Preview
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows | Datadog Security Labs A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug.

Want a clear analysis of the latest OpenSSL CMS/PKCS#12 vulnerabilities and their real-world impact? Our post explains the conditions required for exploitation and how to evaluate practical risk in your environment.
securitylabs.datadoghq.com/articles/ope...

2 months ago 5 1 0 0
Preview
Call for research: AI and LLM security - Hacking The Cloud Hacking the Cloud is opening the door to AI and LLM security research.

AI workloads are landing in the same AWS/Azure/GCP accounts we’ve been breaking into (and defending) for years. It's time for Hacking the Cloud to catch up. We're announcing a call for research! Share your AI and LLM sec research with thousands of readers hackingthe.cloud/blog/call_fo...

2 months ago 2 1 1 0
Preview
Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE | Datadog Security Labs IDE-SHEPHERD is an open-source IDE security extension that provides real-time monitoring and protection for VS Code and Cursor. It intercepts malicious process executions, monitors network activity, a...

IDEs are the new browser: massive attack surface, privileged access to various things, and lots of “just trust it.” Today the Security Research Team at Datadog dropped IDE-SHEPHERD: a tool that watches extensions at runtime and blocks dangerous behavior.

securitylabs.datadoghq.com/articles/ide...

2 months ago 3 1 0 0
Post image Post image

I'm skeptical of the claim that 1,000 Clawdbot instances are publicly facing on the internet. If you look at the Shodan output, most of those boxes don't have port 18789 exposed (default Clawdbot port). The references to 18789 are from mDNS. Take this one for example:

2 months ago 3 0 0 0
Post image

Hmmm, even with sudo access Clawdbot has some sandboxing/protections. In a real environment that's good but I kinda intend for him to have full access to this VM. Gotta change that.

2 months ago 1 0 0 0
Post image Post image

Okay, this is kind of amazing. I wanted to give him a browser so he could surf the net but ran into an error. I was going to fix it myself but said, "Hey man, there is a dpkg in your home directory. Go ahead and install it. You'll have some errors but you'll manage", and he did!

2 months ago 0 0 1 0
Post image

Dang, I should have created clawdbot his own host user. I'll have to take care of that later. Suppose this is a good warning if that's something you want to avoid!

2 months ago 0 0 1 0
Post image

He's alive!

2 months ago 0 0 1 0
Advertisement
Post image Post image

I don't know what skills are exactly, but these seemed useful.

2 months ago 0 0 1 0
Post image Post image

Initial install is easy, there's even an option for integrating with Tailscale which I already setup in the VM.

2 months ago 1 0 1 0
Preview
Clawdbot bought me a car Outsourcing the painful aspects of a car purchase to AI was refreshingly nice, and sold me on the vision of Clawdbot

Trying out clawdbot! And I'll live tweet my experiences setting it up and using it. It's been all of my timeline and doing cool things. (see @ajs.bsky.social's post below).

I'm running this on an Ubuntu VM managed through KVM with 6 cores and 16 gigs of ram.

aaronstuyvenberg.com/posts/clawd-...

2 months ago 0 0 2 0
Preview
Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud How Anthropic's refusal test string can be abused to stop streaming responses and create sticky failures.

Did you know Claude models have a "magic string" to test when a model refuses to respond? If that string enters prompt context, it can be abused to break LLM workflows until context is reset.

It's the EICAR test string of the AI age. Details:

hackingthe.cloud/ai-llm/explo...

2 months ago 10 1 0 0
Preview
On the Coming Industrialisation of Exploit Generation with LLMs Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I adde…

We are on the verge of the commoditization of exploitation. Every vuln will functionally have a public PoC available because attackers can generate them in minutes.

The advantage will increasingly belong to organizations that can detect, respond, and contain fast.

sean.heelan.io/2026/01/18/o...

2 months ago 6 2 0 0