Advertisement · 728 × 90

Posts by LeftenantZero

Critical 10.0 Spinnaker Vulns Allow RCE And Production Compromise - ZeroPath Blog ZeroPath Research discovered two separate RCE vulnerabilities in Spinnaker (CVE-2026-32604 and CVE-2026-32613) that let low-privilege authenticated users execute code on Clouddriver and Echo, enabling...

Our blog announcing these includes a detailed technical walk through+ POCs if you were looking for more information:

zeropath.com/blog/spinnak...

17 hours ago 0 0 0 0
Critical 10.0 Spinnaker Vulns Allow RCE And Production Compromise - ZeroPath Blog ZeroPath Research discovered two separate RCE vulnerabilities in Spinnaker (CVE-2026-32604 and CVE-2026-32613) that let low-privilege authenticated users execute code on Clouddriver and Echo, enabling...

Check out the blog post we announced these in for full technical details, including working POCs!

zeropath.com/blog/spinnak...

17 hours ago 0 0 0 0
Post image

I just published two 10.0 severity Spinnaker vulns that allow code execution and pivoting into source control and production environments!

zeropath.com/blog/spinnak...

(CVE-2026-32604 and CVE-2026-32613)

These issues demonstrate the importance of zero trust architectures and defense in depth.

19 hours ago 1 0 0 0
Preview
Unpatched RAGFlow Vulnerability Allows Post-Auth RCE - ZeroPath Blog A currently-unpatched vulnerability in RAGFlow 0.24 allows low-privilege authenticated users to execute arbitrary code on instances using Infinity for chunk storage. We walk through the discovery, exp...

Unpatched post-auth RCE in the latest version of RAGFlow.

Blog:

zeropath.com/blog/ragflow...

POC:

github.com/ZeroPathAI/r...

Video walkthrough:

youtu.be/1F-27CIlpgE

1 week ago 0 0 0 0
Benchmarking Opus 4.6 For Vuln Detection: Flashes Of Brilliance But Lots of Noise - ZeroPath Blog We tested Opus 4.6 against 435 known vulnerable C functions from real CVEs. With good prompting and tools, it found up to 28.5% of vulnerabilities — impressive compared to human review, but with high ...

How good is Opus 4.6 at simple vuln detection? I built some benchmarks to find out. The results were simultaneously impressive and disappointing.

zeropath.com/blog/benchma...

2 weeks ago 0 0 0 0
Terminal window showing one of the CTF exercises

Terminal window showing one of the CTF exercises

I just released some free exploit development CTFs based on real world CVEs. They include hints, walkthroughs and working exploits if you get stuck.

zeropath.com/blog/zeropat...

1 month ago 0 0 0 0
Preview
Malicious Websites Can Exploit Openclaw (aka Clawdbot) To Steal Credentials - ZeroPath Blog Openclaw (aka Clawdbot) delivers impressive AI experiences but malicious websites can abuse it to steal your credentials

I discovered that Openclaw (aka Clawdbot) allows malicious websites to steal session cookies if you have the chrome extension enabled.

zeropath.com/blog/opencla...

Patch just released -- be sure to update your Openclaw install!

2 months ago 0 0 0 0

Given the real world impact of building software poorly, should software engineering become a profession, just like any other form of engineering in the US?

10 months ago 0 0 0 0
Advertisement
Preview
Coding Through Chaos - CoRecursive Podcast What if your search for connection took you somewhere you never meant to go—almost costing you everything?John Walker grew up building computers and exploring early internet forums, always looking for...

What if your search for connection nearly destroyed you?

@leftenantzero.bsky.social's journey from addiction and isolation to belonging rewrites what it means to find your place.

corecursive.com/coding-throu...

10 months ago 3 1 1 0

"Beware! The time approaches when human beings no longer launch the arrow of their longing beyond the human..." (Nietzsche)

10 months ago 0 0 0 0
Preview
The enshittification of tech jobs Our last line of defense has fallen.

"the enshittification of tech jobs" -- great new Cory Doctorow piece.

doctorow.medium.com/https-plural...

11 months ago 1 0 0 0

Our understanding of ethics is so poor we think policing LLMs to suppress dirty words or scary information has something to do with them.

I'd prefer not to be out of work and under omnipresent AI-powered state surveillance.

"Guardrail" talk is about focusing you on the tech, not the operators.

1 year ago 1 0 0 0

Structures like the modern corporation and modern nation state tend to centralize and concentrate power to the extent the tools and forces available allow them. If not controlled by decentralized structures like DAOs, won't AI just be another powerful tool that allows greater centralization?

1 year ago 0 0 0 0

Companies are already gung ho about replacing workers with LLM's, even when it's a high risk, uncertain thing. While it's unlikely(?), I think we need a plan for knowledge work itself becoming obsolete. It should be more substantive than: let's hope they don't oppress us once they don't need us.

1 year ago 0 0 0 0

I think we need to focus on giving LLM's ersatz empathy and love for humanity. Ethics alone are not enough.

The moment an LLM can be persuaded that cruelty is rational, it will proceed without a second thought to the harm it causes.

The emotional cost of cruelty balances and tempers reason.

1 year ago 1 0 0 0
"how is this false ? I’ve heard this on multiple podcasts?"

"how is this false ? I’ve heard this on multiple podcasts?"

epistemology in the internet era is broken

bring back virtue epistemology

1 year ago 65 4 2 3
Advertisement
Page 1

Page 1

Page 2

Page 2

Page 3

Page 3

Page 4

Page 4

I collaborated with @chatGPT to write a thrilling tale of shadows, surveillance, and secrets in a mechanized world.

Check out the first chapter — crafted with a little help from an LLM.

(Yes, AI wrote this message as well.)

#SciFi #Hacker #Dystopia #AI #LLM #Cyberpunk

1 year ago 1 0 0 0
low detection rates on macOS Amos malware on virustotal

low detection rates on macOS Amos malware on virustotal

Bunch of new Amos/Atomic #macOS #infostealers if you pivot off ```behaviour_processes:"sh -c curl -s https[:]//api.ipify[.]org/?format=text" tag:macho```
Low detections on V(h/t x.com/malwrhuntert...) #malware #apple #cybersecurity

1 year ago 23 7 2 0
John Walker - 5 Must-Know Open Source Identity Management Tools For Cloud Native Stacks
John Walker - 5 Must-Know Open Source Identity Management Tools For Cloud Native Stacks YouTube video by LASCON

What's the point of a new blue sky account without some shameless self promotion:

I think we overlook defense in depth when it comes to identity, and that unsexy identity posture hardening one of the biggest opportunities defenders have to make attackers work harder.

youtu.be/wtAJogbtrPw

1 year ago 1 0 0 0

Nope:-/. Maybe just a fellow officer in his majesty's royal navy?

1 year ago 0 0 0 0

Hello world

1 year ago 4 0 1 0