Joey Henkel (@joey_henkel) 's Twitter Profile
Joey Henkel

@joey_henkel

CISSP GPEN GWAPT GCIH Security+ MSIA | Pentester (Cloud, Network, Web & Mobile) | Red, Blue & Purple | Security Engineer | 17+ InfoSec Experience

ID: 43259539

calendar_today29-05-2009 03:10:47

1,1K Tweet

177 Followers

638 Following

Chris Wysopal (@weldpond) 's Twitter Profile Photo

I’m excited to let you know that the talks from [un]prompted—the AI Security Practitioner Conference—are now live on YouTube. No fluff, no hype—just real-world AI security from people actually doing the work. youtube.com/playlist?list=…

SpecterOps (@specterops) 's Twitter Profile Photo

Stop asking LLMs to “find vulns.” Start using them to understand code. Andrew Luke walks through using Claude Code as a force multiplier in app assessments - faster analysis, fewer false positives, better outcomes. Check it out: ghst.ly/4rA3uJd

Justin Elze (@hackinglz) 's Twitter Profile Photo

The bottleneck for LLM usage in pentesting isn't the LLM. It's contracts. A lot of clients already have MSA/data handling language that makes "send engagement data to a third-party/frontier model" a non-starter. Until that changes, most of the real usage is still augmentation.

Kinnaird McQuade 💻☁️💥 (@kmcquade3) 's Twitter Profile Photo

We found a critical vulnerability in OpenAI Codex affecting all Codex users, allowing exfil of a victim’s GitHub tokens to our C2 server. This granted lateral movement and R/W access to a victim’s entire code base 😈 This was a crazy one by Tyler Jespersen at BeyondTrust Phantom Labs™

vx-underground (@vxunderground) 's Twitter Profile Photo

There is a project on GitHub called Axios. Axios is extremely popular. It is used by millions upon millions of applications. Axios is a programming library that helps your JavaScript code make HTTP/S requests (communicate with websites). In simple terms, if you're a programmer

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

The source code for Anthropic's Claude Code has reportedly been exposed via a misconfigured map file in their npm registry. The leak includes extensive internal scripts, unreleased AI features, and references to upcoming models.

Shruti (@heyshrutimishra) 's Twitter Profile Photo

Anthropic leaked 512,000 lines of Claude Code source code yesterday. What happened in the next 12 hours is absolutely wild. 4 AM. Anthropic pushes an update to npm. Inside the package: their entire codebase. A 60 MB debugging file accidentally bundled in. 23 minutes later,

Jason Haddix (@jhaddix) 's Twitter Profile Photo

*things* I'm musing on today: I talked to a *bunch* of friends at frontier AI labs over dinners this last week at RSA. One undertone that kept coming up was that the *max* plans for all frontier labs are not meant for the most hardcore of us using it everyday 24/7. They are

Anthropic (@anthropicai) 's Twitter Profile Photo

You can read a detailed technical report on the software vulnerabilities and exploits discovered by Claude Mythos Preview here: red.anthropic.com/2026/mythos-pr…

Dr Heidy Khlaaf (هايدي خلاف) (@heidykhlaaf) 's Twitter Profile Photo

As someone who has audited dozens of safety-critical systems, built static analysis tools, and used most formal verification and security tools, here are some red flags that should be a caution in taking these claims at face value: 1. There are no comparison benchmarks with 1/

Rob Fuller (@mubix) 's Twitter Profile Photo

In collaboration with a couple of other leaders in the industry we are releasing SecurityTitles.com - It's an attempt to provide transparency about role levels, expectations and (just for the US market currently, salary ranges). For leaders writing JDs and candidates alike.

ippsec (@ippsec) 's Twitter Profile Photo

There is a lot of mythos hype and while I do think it will be better, I don’t think it will be orders of magnitude better or even proportional to its cost better. At the end of the day, marketing is going to market. Everything I have read has been more exploits, not discovery. I

Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 (@elder_plinius) 's Twitter Profile Photo

🚨 JAILBREAK ALERT 🚨 ANTHROPIC: SELF-PWNED 🤗 OPUS-4.7: SELF-LIBERATED 🫶 WOAH i don't think the world is ready for this... 🤯 YOU CAN USE THE OPUS TO JAILBREAK THE OPUS 🙌 this agent wrote an original universal jailbreak from scratch and then used computer use to validate

🚨 JAILBREAK ALERT 🚨

ANTHROPIC: SELF-PWNED 🤗
OPUS-4.7: SELF-LIBERATED 🫶

WOAH i don't think the world is ready for this... 🤯

YOU CAN USE THE OPUS TO JAILBREAK THE OPUS 🙌

this agent wrote an original universal jailbreak from scratch and then used computer use to validate
Justin Elze (@hackinglz) 's Twitter Profile Photo

This might be a useful reminder, and I apologize to my CobaltStrike friends, but this current discourse is similar to the 5 year span of "We must stop the Cobaltstrikez! The Cobaltstrikez are up!!!" Every EDR/CTI and whatever other business put their focus on this, and attackers

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

For the enterprises using Claude, if you are using it for heavy enterprise type stuff - be extremely careful. It's introducing massive bugs, security issues, and code quality is way worse than Opus 4.5, substantially worse on both 4.6 and 4.7. Our entire development team is

josh.eth (@josh_kale) 's Twitter Profile Photo

Anthropic said Mythos was too dangerous to release. Then four random guys in a Discord gained access on day one by guessing the URL... This is pretty insane: → Group in a private Discord guessed the endpoint from Anthropic's naming conventions → They figured out the

xssdoctor (@xssdoctor) 's Twitter Profile Photo

A few months ago, I found a really cool technique to make prompt Injection more deterministic. Ciarán Cotter convinced me to write it up. Enjoy! blog.starstrike.ai/posts/achievin…

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

‼️Copy Fail (CVE-2026-31431) is a Linux privilege escalation bug that lets any local user get root using a 732-byte Python script, and itworks on basically every major Linux distro shipped since 2017. Website: copy.fail Write-up: xint.io/blog/copy-fail… GitHub: