rsclarke (@rsclarke) 's Twitter Profile
rsclarke

@rsclarke

Independent security researcher and engineer

ID: 10033652

linkhttps://linktr.ee/rsclarke calendar_today07-11-2007 14:52:48

583 Tweet

137 Takipçi

801 Takip Edilen

rsclarke (@rsclarke) 's Twitter Profile Photo

Accidentally hitting reject all by the AI's code changes and asking it to politely recreate is like relearning why we make small changes and commit often.

rsclarke (@rsclarke) 's Twitter Profile Photo

The inverse pomodoro technique. Spend 5 minutes focused on writing your prompt, break for 25 whilst you wait for the AI.

rsclarke (@rsclarke) 's Twitter Profile Photo

Had a fun idea to expose tasks in a Taskfile as MCP tools. If I've already got a Taskfile telling local and CI how to build, why repeat this in another markdown doc for the agent? github.com/rsclarke/mcp-t…

geoff (@geoffreyhuntley) 's Twitter Profile Photo

🗞️ [👇 link below 👇] I was sitting next to a mate at a pub; it was pretty late, and we were just talking about LLM capabilities, riffing about what the modern version of Falco or any of these tools in the DFIR space looks like when combined with an LLM. You see, a couple of

🗞️ [👇 link below 👇]

I was sitting next to a mate at a pub; it was pretty late, and we were just talking about LLM capabilities, riffing about what the modern version of Falco or any of these tools in the DFIR space looks like when combined with an LLM.

You see, a couple of
Feross (@feross) 's Twitter Profile Photo

1/ 🚨 Major supply chain breach just hit the JavaScript ecosystem. Attackers hijacked popular npm packages — including is (~3M downloads/week) — to silently ship remote access malware into dev environments. Here’s what happened, and how Socket caught it 🧵

1/ 🚨 Major supply chain breach just hit the JavaScript ecosystem.

Attackers hijacked popular npm packages — including is (~3M downloads/week) — to silently ship remote access malware into dev environments.

Here’s what happened, and how Socket caught it 🧵
mbg (@mbrg0) 's Twitter Profile Photo

after several hours of github dorking we have: - hacker's user and intent - downloader - prompt payload - evasion techniques - timeline from july 13 thru was mitigation and cover big open questions: how did lkmanka58 gain initial access? is this the only user involved?

after several hours of github dorking we have:
- hacker's user and intent
- downloader
- prompt payload
- evasion techniques
- timeline from july 13 thru was mitigation and cover

big open questions: how did lkmanka58 gain initial access? is this the only user involved?
Theori (@theori_io) 's Twitter Profile Photo

🏆 Theori just placed 3rd at DARPA's AI Cyber Challenge! Our AI system RoboDuck ranked among the top teams in the world. No humans. Just code that finds and fixes bugs on its own. And the best part? It’s open source. 👉 theori-io.github.io/aixcc-public/

🏆 Theori just placed 3rd at <a href="/DARPA/">DARPA</a>'s AI Cyber Challenge!

Our AI system RoboDuck ranked among the top teams in the world. No humans. Just code that finds and fixes bugs on its own.
And the best part? It’s open source.
👉 theori-io.github.io/aixcc-public/