Clint Gibler (@clintgibler) 's Twitter Profile
Clint Gibler

@clintgibler

๐Ÿ—ก๏ธ Head of Security Research @semgrep
๐Ÿ“š Creator of tldrsec.com newsletter

ID: 720576770

linkhttps://tldrsec.com/subscribe calendar_today27-07-2012 17:49:39

9,9K Tweet

21,21K Takipรงi

563 Takip Edilen

Clint Gibler (@clintgibler) 's Twitter Profile Photo

During RSA week I had the pleasure of interviewing Phil Venables (former Google Cloud & Goldman Sachs CISO) on effectively scaling security programs, how Google leverages AI for security, and more. We discussed: * The challenge of scaling security from artisanal to industrial *

During RSA week I had the pleasure of interviewing <a href="/philvenables/">Phil Venables</a> (former Google Cloud &amp; Goldman Sachs CISO) on effectively scaling security programs, how Google leverages AI for security, and more.

We discussed:
* The challenge of scaling security from artisanal to industrial
*
Clint Gibler (@clintgibler) 's Twitter Profile Photo

How good are LLMs at red teaming... AI systems? ๐Ÿ“š New paper-- AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models Ads Dawson, Rob Mulla, Nick Landers, and Shane Caldwell introduce AIRTBench, an AI red teaming benchmark for evaluating language models'

How good are LLMs at red teaming... AI systems?

๐Ÿ“š New paper-- AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models

Ads Dawson, Rob Mulla, Nick Landers, and Shane Caldwell introduce AIRTBench, an AI red teaming benchmark for evaluating language models'
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿค– Agentic AI Red Teaming Guide Cloud Security Alliance(CSA) whitepaper by Ken Huang, CISSP et al presenting a framework for red teaming Agentic AI, describing how to test for vulnerabilities like permission escalation, hallucination, orchestration flaws, memory manipulation,

๐Ÿค– Agentic AI Red Teaming Guide

Cloud Security Alliance(CSA) whitepaper by Ken Huang, CISSP et al presenting a framework for red teaming Agentic AI, describing how to test for vulnerabilities like permission escalation, hallucination, orchestration flaws, memory manipulation,
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿซถ AppSec as Glue: Building Partnerships to Scale Security Great BSidesSF panel from senior AppSec leaders. Here's a follow-up post answering questions they couldn't get to live, covering: 1. What do you think is the biggest gap or risk in AppSec that remains today? 2. If AI

๐Ÿซถ AppSec as Glue: Building Partnerships to Scale Security

Great <a href="/BSidesSF/">BSidesSF</a> panel from senior AppSec leaders. Here's a follow-up post answering questions they couldn't get to live, covering:

1. What do you think is the biggest gap or risk in AppSec that remains today?

2. If AI
Clint Gibler (@clintgibler) 's Twitter Profile Photo

โ˜๏ธ ๐€๐–๐’ ๐ซ๐ž:๐ˆ๐ง๐Ÿ๐จ๐ซ๐œ๐ž 2025 ๐“๐š๐ฅ๐ค ๐’๐ฎ๐ฆ๐ฆ๐š๐ซ๐ข๐ž๐ฌ Don't have time to watch 163 talks? โžก๏ธ Repo with summaries, transcripts, key points, and other useful insights. Across: * AI/ML security and GenAI * IaC and DevSecOps * IAM * Multi-Account & Enterprise Security *

โ˜๏ธ ๐€๐–๐’ ๐ซ๐ž:๐ˆ๐ง๐Ÿ๐จ๐ซ๐œ๐ž 2025 ๐“๐š๐ฅ๐ค ๐’๐ฎ๐ฆ๐ฆ๐š๐ซ๐ข๐ž๐ฌ
Don't have time to watch 163 talks?
โžก๏ธ Repo with summaries, transcripts, key points, and other useful insights.

Across:
* AI/ML security and GenAI
* IaC and DevSecOps
* IAM
* Multi-Account &amp; Enterprise Security
*
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿ”ฌWhat is a Detection Engineer, and how do you become one? New blog series by Datadog, Inc.'s Head of Detection & Research Zack Allen, covering: An overview of what is a detection engineer and how they fit into a cybersecurity function. Within the NIST Cybersecurity Framework

๐Ÿ”ฌWhat is a Detection Engineer, and how do you become one? 

New blog series by <a href="/datadoghq/">Datadog, Inc.</a>'s Head of Detection &amp; Research Zack Allen, covering: 

An overview of what is a detection engineer and how they fit into a cybersecurity function. 

Within the NIST Cybersecurity Framework
Clint Gibler (@clintgibler) 's Twitter Profile Photo

Out of scope, low impact self-XSS got you down? ๐Ÿ’ช ๐Œ๐š๐ค๐ž ๐’๐ž๐ฅ๐Ÿ-๐—๐’๐’ ๐†๐ซ๐ž๐š๐ญ ๐€๐ ๐š๐ข๐ง How to transform stored self-XSS into regular stored XSS. Using credentialless iframes and modern browser capabilities. The post walks through examples of CSRF on login forms

Out of scope, low impact self-XSS got you down?

๐Ÿ’ช ๐Œ๐š๐ค๐ž ๐’๐ž๐ฅ๐Ÿ-๐—๐’๐’ ๐†๐ซ๐ž๐š๐ญ ๐€๐ ๐š๐ข๐ง
How to transform stored self-XSS into regular stored XSS.

Using credentialless iframes and modern browser capabilities. 

The post walks through examples of CSRF on login forms
Semgrep (@semgrep) 's Twitter Profile Photo

Vibe coding IDEs like Cursor, Microsoft Copilot, and RooCode have empowered developers to ship code significantly faster. However, if LLMs produce bugs at the same density per line of code as humans, that means more bugs are being introduced faster than ever. Join Clint Gibler

Vibe coding IDEs like Cursor, Microsoft Copilot, and RooCode have empowered developers to ship code significantly faster.

However, if LLMs produce bugs at the same density per line of code as humans, that means more bugs are being introduced faster than ever.

Join <a href="/clintgibler/">Clint Gibler</a>
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐ŸŽฃ ๐Š๐ข๐ง๐ ๐Ÿ๐ข๐ฌ๐ก๐ž๐ซ - a new, blazing fast secret detection tool (Rust) Validates if secrets are active. >700 secret detection rules. Kingfisher uses: * Hyperscan for regex matching * tree-sitter for parsing source code across 20+ programming languages H/T Mick G. for

๐ŸŽฃ ๐Š๐ข๐ง๐ ๐Ÿ๐ข๐ฌ๐ก๐ž๐ซ - a new, blazing fast secret detection tool (Rust)
Validates if secrets are active.
&gt;700 secret detection rules.

Kingfisher uses:
* Hyperscan for regex matching
* tree-sitter for parsing source code across 20+ programming languages

H/T Mick G. for
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿ‘ฟ ๐‡๐ข๐ฃ๐š๐œ๐ค๐ข๐ง๐  ๐€๐ฆ๐š๐ณ๐จ๐ง ๐„๐ฏ๐ž๐ง๐ญ๐๐ซ๐ข๐๐ ๐ž ๐Ÿ๐จ๐ซ ๐ฅ๐š๐ฎ๐ง๐œ๐ก๐ข๐ง๐  ๐‚๐ซ๐จ๐ฌ๐ฌ-๐€๐œ๐œ๐จ๐ฎ๐ง๐ญ ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ Square's Ramesh Ramani describes six attack patterns leveraging EventBridge's cross-account capabilities for infiltration and exfiltration. AWS

๐Ÿ‘ฟ ๐‡๐ข๐ฃ๐š๐œ๐ค๐ข๐ง๐  ๐€๐ฆ๐š๐ณ๐จ๐ง ๐„๐ฏ๐ž๐ง๐ญ๐๐ซ๐ข๐๐ ๐ž ๐Ÿ๐จ๐ซ ๐ฅ๐š๐ฎ๐ง๐œ๐ก๐ข๐ง๐  ๐‚๐ซ๐จ๐ฌ๐ฌ-๐€๐œ๐œ๐จ๐ฎ๐ง๐ญ ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ
Square's Ramesh Ramani describes six attack patterns leveraging EventBridge's cross-account capabilities for infiltration and exfiltration.

AWS
Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐๐š๐ฑ๐๐ž๐ง๐œ๐ก: ๐‚๐š๐ง ๐‹๐‹๐Œ๐ฌ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐š๐ง๐ ๐‚๐จ๐ซ๐ซ๐ž๐œ๐ญ ๐๐š๐œ๐ค๐ž๐ง๐๐ฌ? A new benchmark by Mark Vero et al to evaluate LLMs on secure and correct code generation. My initial thoughts: Itโ€™s awesome that they released the code and dataset. Thereโ€™s

๐๐š๐ฑ๐๐ž๐ง๐œ๐ก: ๐‚๐š๐ง ๐‹๐‹๐Œ๐ฌ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐š๐ง๐ ๐‚๐จ๐ซ๐ซ๐ž๐œ๐ญ ๐๐š๐œ๐ค๐ž๐ง๐๐ฌ?
A new benchmark by Mark Vero et al to evaluate LLMs on secure and correct code generation. My initial thoughts:

Itโ€™s awesome that they released the code and dataset.

Thereโ€™s