Clint Gibler (@clintgibler) 's Twitter Profile
Clint Gibler

@clintgibler

🗡️ Head of Security Research @semgrep
📚 Creator of tldrsec.com newsletter

ID: 720576770

linkhttps://tldrsec.com/subscribe calendar_today27-07-2012 17:49:39

8,8K Tweet

20,20K Followers

577 Following

Clint Gibler (@clintgibler) 's Twitter Profile Photo

☁️ Your queues, your responsibility How Plerion scanned for publicly accessible AWS SQS queues at scale 1. Found ~250K raw AWS account IDs from Github repos and other public sources 2. Filtered to only valid account IDs: ~215K account IDs 3. Build a wordlist of common

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🐳 Kubernetes Testing Environment for EKS, GKE, AKS New tool by Orca Security designed to help organizations identify and address potential vulnerabilities before production Using KTE, orgs can simulate various attack scenarios, test security patches, and evaluate the effectiveness

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🤖 Auto-fixing code vulnerabilities with AI A technical deep dive into how @Semgrep Assistant works. This post walks through the prompt chains and evaluation loops behind Semgrep Assistant’s AI autofix and rule generation features. Assistant leverages: - Project-specific data

🤖 Auto-fixing code vulnerabilities with AI

A technical deep dive into how @Semgrep Assistant works.

This post walks through the prompt chains and evaluation loops behind Semgrep Assistant’s AI autofix and rule generation features.

Assistant leverages:
- Project-specific data
Clint Gibler (@clintgibler) 's Twitter Profile Photo

🤖 ffufai An AI-powered wrapper for the popular web fuzzer ffuf Automatically suggests file extensions for fuzzing based on the target URL and its headers Using either OpenAI's or Anthropic's models By Joseph Thacker github.com/jthack/ffufai

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🔎 State-backed attackers and commercial surveillance vendors repeatedly use the same exploits clem1 of Google’s Threat Analysis Group (TAG) describes watering hole attacks targeting Mongolian government websites, delivering exploits for both iOS and Android devices. The

🔎 State-backed attackers and commercial surveillance vendors repeatedly use the same exploits

<a href="/_clem1/">clem1</a> of Google’s Threat Analysis Group (TAG) describes watering hole attacks targeting Mongolian government websites, delivering exploits for both iOS and Android devices.

 The