Tool: AST-based security scanner for AI-generated code (MCP server)
https://ift.tt/mc6CoVt
Submitted February 06, 2026 at 09:55PM by NoButterfly9145
via reddit https://ift.tt/rbwKiQ3
https://ift.tt/mc6CoVt
Submitted February 06, 2026 at 09:55PM by NoButterfly9145
via reddit https://ift.tt/rbwKiQ3
AI Agents’ Most Downloaded Skill Is Discovered to Be an Infostealer
https://ift.tt/ahdy5Hm
Submitted February 06, 2026 at 11:40PM by Malwarebeasts
via reddit https://ift.tt/eyDM3Gk
https://ift.tt/ahdy5Hm
Submitted February 06, 2026 at 11:40PM by Malwarebeasts
via reddit https://ift.tt/eyDM3Gk
InfoStealers
AI Agents’ Most Downloaded Skill Is Discovered to Be an Infostealer
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.
crypto-scanner: Open-source CLI tool to find quantum-vulnerable cryptography in your codebase
https://ift.tt/JxXf0lT
Submitted February 07, 2026 at 07:11AM by MindlessConclusion42
via reddit https://ift.tt/fWoIhw8
https://ift.tt/JxXf0lT
Submitted February 07, 2026 at 07:11AM by MindlessConclusion42
via reddit https://ift.tt/fWoIhw8
PyPI
crypto-scanner
CLI tool for scanning cryptographic usage and generating quantum-vulnerability risk assessments
trappsec: open source framework for API deception
https://trappsec.dev
Submitted February 07, 2026 at 08:29PM by nikhil-salgaonkar
via reddit https://ift.tt/e98Binm
https://trappsec.dev
Submitted February 07, 2026 at 08:29PM by nikhil-salgaonkar
via reddit https://ift.tt/e98Binm
trappsec
Introduction
deception as a developer tool
Cloud Deception Management Platform (Open-source Cloud Canaries)
https://ift.tt/JiIyn7d
Submitted February 08, 2026 at 12:50AM by John_Earle
via reddit https://ift.tt/RjlcIgX
https://ift.tt/JiIyn7d
Submitted February 08, 2026 at 12:50AM by John_Earle
via reddit https://ift.tt/RjlcIgX
Vimeo
Coalmine[Alpha] WebUI Walkthrough Overview
This is an early alpha of Coalmine an opensource cloud canary management tool
New OSS secret scanner: Kingfisher (Rust) validates exposed creds + maps permissions
https://ift.tt/f1iAVZt
Submitted February 07, 2026 at 11:48PM by micksmix
via reddit https://ift.tt/8XakdWU
https://ift.tt/f1iAVZt
Submitted February 07, 2026 at 11:48PM by micksmix
via reddit https://ift.tt/8XakdWU
MongoDB
Introducing Kingfisher: Real-Time Secret Detection And Validation
Discover Kingfisher, MongoDB’s open-source tool for security and DevOps engineers to detect and validate exposed secrets in code and repositories.
macOS Touch ID/Bio-metric kill switch like iPhone has - PanicLock
https://paniclock.github.io/
Submitted February 08, 2026 at 04:34PM by seanieb
via reddit https://ift.tt/zhldLjF
https://paniclock.github.io/
Submitted February 08, 2026 at 04:34PM by seanieb
via reddit https://ift.tt/zhldLjF
paniclock.github.io
PanicLock - Panic Button for Your Mac
PanicLock - Keep Touch ID for daily convenience, get instant password-only security when you need it. Your Mac's escape hatch for border crossings, protests, and high-risk situations.
OverTheWire Bandit: a complete walkthrough with in-depth explanations
https://ift.tt/pNfMbB0
Submitted February 08, 2026 at 08:20PM by shelltief
via reddit https://ift.tt/HkGMuBT
https://ift.tt/pNfMbB0
Submitted February 08, 2026 at 08:20PM by shelltief
via reddit https://ift.tt/HkGMuBT
Defense Evasion: The Service Run Failed Successfully
https://ift.tt/6osVSMU
Submitted February 08, 2026 at 07:51PM by Cold-Dinosaur
via reddit https://ift.tt/TDtxJLw
https://ift.tt/6osVSMU
Submitted February 08, 2026 at 07:51PM by Cold-Dinosaur
via reddit https://ift.tt/TDtxJLw
Zerosalarium
Defense Evasion: The Service Run Failed Successfully
RecoverIt uses penetration testing techniques to exploit service failure recovery functions to trigger the execution of malicious payloads.
Vouch: earn the right to submit a pull request
https://ift.tt/OlQyVsC
Submitted February 08, 2026 at 11:58PM by jpcaparas
via reddit https://ift.tt/QmnGFis
https://ift.tt/OlQyVsC
Submitted February 08, 2026 at 11:58PM by jpcaparas
via reddit https://ift.tt/QmnGFis
Medium
Vouch: earn the right to submit a pull request
Mitchell Hashimoto got tired of AI PR slop, so he built Vouch: a trust management system that could change how open source handles…
klint - Linux Kernel Security Scanner
https://saturnine.cc/klint
Submitted February 09, 2026 at 11:50AM by Short_Radio_1450
via reddit https://ift.tt/neb8xK2
https://saturnine.cc/klint
Submitted February 09, 2026 at 11:50AM by Short_Radio_1450
via reddit https://ift.tt/neb8xK2
saturnine.cc
klint - Linux Kernel Security Scanner
klint is a single-binary, one-shot Linux incident response scanner. Detect hidden kernel modules, rootkits, and compromised system state.
Open Security Architecture - 15 new security patterns with NIST 800-53 mappings (free, CC BY-SA 4.0)
https://ift.tt/oHTxLdu
Submitted February 09, 2026 at 03:08PM by cyberruss
via reddit https://ift.tt/Qmalscz
https://ift.tt/oHTxLdu
Submitted February 09, 2026 at 03:08PM by cyberruss
via reddit https://ift.tt/Qmalscz
www.opensecurityarchitecture.org
Home | Open Security Architecture
Open Security Architecture - Free, open security patterns and NIST 800-53 control mappings for enterprise security architects.
Roundcube Webmail: SVG feImage bypasses image blocking to track email opens
https://ift.tt/bKJ0rO7
Submitted February 09, 2026 at 02:35AM by nullcathedral
via reddit https://ift.tt/VhuiyIx
https://ift.tt/bKJ0rO7
Submitted February 09, 2026 at 02:35AM by nullcathedral
via reddit https://ift.tt/VhuiyIx
NULL CATHEDRAL
Roundcube Webmail <1.5.13 / <1.6.13 allows attackers to force remote image loads via SVG feImage
Roundcube's HTML sanitizer doesn't treat SVG feImage href as an image source. Attackers can bypass remote image blocking to track email opens. (CVE-2026-25916)
On the risk of destructive bricking attacks against OT devices (part 1)
https://ift.tt/obchjve
Submitted February 09, 2026 at 05:00PM by 2ROT13
via reddit https://ift.tt/kdRbSo8
https://ift.tt/obchjve
Submitted February 09, 2026 at 05:00PM by 2ROT13
via reddit https://ift.tt/kdRbSo8
www.midnightblue.nl
On the risk of destructive bricking attacks against OT devices (part 1)
A discussion of the recent cyber attacks against a number of targets connected to Polands electric grid.
CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required
https://ift.tt/lBdNK9L
Submitted February 09, 2026 at 08:03PM by aconite33
via reddit https://ift.tt/32VaBb4
https://ift.tt/lBdNK9L
Submitted February 09, 2026 at 08:03PM by aconite33
via reddit https://ift.tt/32VaBb4
Blacklanternsecurity
CVE-2026-2103 - Infor Syteline ERP
Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools
https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/
Submitted February 10, 2026 at 02:41AM by Worldly-Fruit5174
via reddit https://ift.tt/5pO6th2
https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/
Submitted February 10, 2026 at 02:41AM by Worldly-Fruit5174
via reddit https://ift.tt/5pO6th2
0xMatheuZ
Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools
Deep technical analysis of bypassing eBPF-based security solutions through kernel-level hooks targeting BPF iterators, ringbuffers, and perf events
Augustus: Open Source LLM Prompt Injection Tool
https://ift.tt/sFyd8Ii
Submitted February 10, 2026 at 02:56AM by Praetorian_Security
via reddit https://ift.tt/f93jci8
https://ift.tt/sFyd8Ii
Submitted February 10, 2026 at 02:56AM by Praetorian_Security
via reddit https://ift.tt/f93jci8
Praetorian
Introducing Augustus: Open Source LLM Prompt Injection Tool | Praetorian
From LLM Fingerprinting to LLM Prompt Injection LLMs Are Deployed Faster Than They're Tested Introducing Augustus How It Works Buff Transformations 28 LLM Providers Quick Start What's Next Contributing & Community
We scanned 8,000+ MCP servers, this is what we learned.
https://mcp-trust.com
Submitted February 10, 2026 at 04:44AM by Upstairs_Safe2922
via reddit https://ift.tt/AEjW3BT
https://mcp-trust.com
Submitted February 10, 2026 at 04:44AM by Upstairs_Safe2922
via reddit https://ift.tt/AEjW3BT
Reddit
From the netsec community on Reddit: We scanned 8,000+ MCP servers, this is what we learned.
Explore this post and more from the netsec community
Http11Probe - Probe for Http 1.1 compliance
https://mda2av.github.io/Http11Probe/
Submitted February 10, 2026 at 04:24PM by MDA2AV
via reddit https://ift.tt/Qh2mbIo
https://mda2av.github.io/Http11Probe/
Submitted February 10, 2026 at 04:24PM by MDA2AV
via reddit https://ift.tt/Qh2mbIo
mda2av.github.io
Http11Probe
Open Source HTTP/1.1 Compliance Platform An open testing platform that probes HTTP/1.1 servers against RFC 9110/9112 requirements, smuggling vectors, and malformed input handling. Add your framework, get compliance results automatically.
GAC Hijacking
https://ift.tt/hDvz0Id
Submitted February 10, 2026 at 05:35PM by netbiosX
via reddit https://ift.tt/FYNCU3e
https://ift.tt/hDvz0Id
Submitted February 10, 2026 at 05:35PM by netbiosX
via reddit https://ift.tt/FYNCU3e
Purple Team
GAC Hijacking
The Global Assembly Cache is a system-wide repository in the .NET framework that stores strong named (name + version + culture + public key token identity) assemblies so multiple applications can u…
We hid backdoors in binaries — Opus 4.6 found 49% of them
https://ift.tt/SAiBCWm
Submitted February 10, 2026 at 07:48PM by jakozaur
via reddit https://ift.tt/rPT0ZbN
https://ift.tt/SAiBCWm
Submitted February 10, 2026 at 07:48PM by jakozaur
via reddit https://ift.tt/rPT0ZbN
Quesma
We hid backdoors in binaries — Opus 4.6 found 49% of them - Quesma Blog
BinaryAudit benchmarks AI agents using Ghidra to find backdoors in compiled binaries of real open-source servers, proxies, and network infrastructure.