- Home
- Blog
Current security notes, without the noise.
Agentic AI security, exploited-vulnerability briefs, lab practices, OSINT reporting, and workflow guidance for people doing authorized security work.
Library Snapshot
- Posts
- 24
- Topics
- 10
- Words
- 8,364

Claude Code's Source-Map Leak Is a Release Pipeline Lesson
The interesting part is not gossip about leaked code. It is how one packaged artifact can expose architecture, roadmap clues, and operational hygiene gaps.
Latest Signals
Current writing stays short and sharp. The full archive sits below it without stretching the page sideways.

AI Review Bots Turn PR Text Into a Control Plane
Prompt injection in GitHub Actions is not theoretical anymore. PR titles, comments, and issue text can become instructions for agents with repository secrets.

Fake Claude Code Leaks Are Becoming Developer Malware Bait
When a famous tool leaks, curiosity becomes the lure. The defensive play is boring provenance, clean downloads, and treating unofficial mirrors as hostile.

Workspace Trust Is the New Git Hooks Problem
Agentic coding tools read repository configuration before they do real work. That makes workspace trust a first-class control, not a welcome dialog.

MCP Inspector RCE Shows Localhost Is Not a Wall
MCP tools are developer infrastructure now. Debug ports, browser reachability, and tool permissions need the same scrutiny as any local admin surface.

Agentic Coding Tools Need Permission Design, Not Vibes
The next security layer for coding agents is deterministic permission boundaries: what can be read, what can be changed, and what requires human intent.

What April 2026 KEV Additions Mean for Patch Triage
CISA's live KEV feed is moving fast again. Here's how to turn the latest exploited-vulnerability signal into a practical patch queue.
Apr 16, 2026
2 min read
ActiveMQ in KEV: Message Brokers Need Exposure Reviews
Apache ActiveMQ entered CISA KEV on April 16. The defensive move is ownership, exposure mapping, and broker-specific validation.
Apr 15, 2026
2 min read
SharePoint and Exchange Still Need Critical-Asset Treatment
Recent KEV entries are a reminder that collaboration platforms carry identity, documents, workflows, and trust relationships.
Apr 14, 2026
2 min read
Old Office and Acrobat Bugs Are Still Current Risk
Legacy document-handling CVEs returning through KEV should trigger file-handler inventory, not eye rolling.
Apr 13, 2026
2 min read
FortiClient EMS in KEV: Management Tools Need Edge Urgency
Endpoint management systems sit near policy and administrative trust, so KEV additions should trigger exposure review and log checks.
Apr 12, 2026
1 min read
Ivanti EPMM: Mobile Management Is Identity Infrastructure
CISA's Ivanti EPMM KEV entry is a cue to review external reachability, enrollment activity, admin roles, and logs.
Apr 11, 2026
2 min read
Trivy and Langflow KEV Entries Put Developer Tools in Scope
Scanner, AI workflow, and automation tools are production-adjacent when they touch secrets, artifacts, and CI systems.
Apr 10, 2026
2 min read
Citrix, F5, and the Edge Appliance Review Habit
Recent appliance KEV entries reinforce the same lesson: patch fast, then review interfaces, persistence, and management segmentation.
Apr 17, 2026
4 min read
Building a Safer HID Automation Lab
A practical framework for running HID automation tests in controlled environments without turning demos into messy evidence.
Apr 10, 2026
2 min read
A Firmware Update Routine Security Teams Can Trust
A practical update process for keeping devices predictable, documented, and ready before lab sessions or client work.
Apr 3, 2026
2 min read
Writing Better Security Evidence
How to collect small, clear evidence sets that help control owners understand, verify, and fix security findings.
Apr 17, 2026
3 min read
OSINT Workflow Hygiene for Authorized Research
How to structure collection, confidence labels, and evidence so open-source intelligence work stays useful and respectful.
Mar 20, 2026
2 min read
Keyboard Layouts Can Make or Break HID Tests
Why keyboard layout should be treated as part of the environment, not an afterthought in automation testing.
Apr 17, 2026
3 min read
USB Policy Validation That Defenders Can Act On
A focused testing model for checking prevention, detection, and response around unknown USB and HID devices.
Mar 6, 2026
2 min read
Building a Security Lab Kit Your Team Will Actually Use
How to standardize devices, reset paths, labels, and evidence templates so lab work becomes repeatable.
Feb 27, 2026
2 min read
How to Make OSINT Reports Client-Ready
A cleaner structure for turning public-source observations into selective, confidence-aware client findings.
Apr 17, 2026
3 min read
Red-Team Device Prep Before the Window Opens
A calm checklist for firmware state, evidence handling, teardown, and keeping client-specific data disposable.
Feb 13, 2026
2 min read
What to Do After a Physical Access Test
A closeout routine for timelines, cleanup, alert review, and recommendations after authorized physical testing.
Want us to cover a workflow?
Send a topic request to admin@zerotrace.pw and we will consider it for the next field note.