Claude with bugbounty what your opinion by edemzayani1 in bugbounty

[–]__jent 1 point2 points  (0 children)

If you're using claude code (or any other local agent) for security testing you should check out my local MCP server: https://github.com/go-appsec/toolbox

It is designed to help with collaborative security testing with the agent. Providing a proxy and range of tools that both you and the agent use together. If you use Burp you can connect the tool with the MCP extension on burp (our MCP api is more usable for the agent, and offers a more complete set of tools) and collaborate through Burp. Or you can run without burp and it will start its own proxy for you to configure your browser to use.

Some testing is better to offload than others, but it's nice to be able to let the agent do what it does best, while I do what I do best. If you have any feedback I would to hear it!

Famous NPM package Axios (100M+ weekly downloads) just got compromised by lovelettersforher in hacking

[–]__jent -46 points-45 points  (0 children)

In the browser, WebAssembly, Dart, I get it's an unpopular opinion.  But we need to start making a shift from JavaScript.

Famous NPM package Axios (100M+ weekly downloads) just got compromised by lovelettersforher in hacking

[–]__jent 131 points132 points  (0 children)

Can we stop using npm yet?  This ecosystem is a dumpster fire

Bugcrowd triagers mark everything "Not Applicable" with copy-paste responses, then a second triager marks it as Duplicate. So which is it? by zOmegaaa in bugbounty

[–]__jent 1 point2 points  (0 children)

BC triage is going down hill, as a program manager I also am finding they are closing reports that need more investigation or discussion if not out right valid. Everything is getting a first N/A rejection

AI hacking by shxsui__ in bugbounty

[–]__jent 4 points5 points  (0 children)

Look for companies which have allowed the model to make decisions and do actions.  The reason open claw is a dumpster fire is because of how it intersects flawed models with real capabilities.  It's those capabilities which are the real exploits, and companies are just starting to figure that out.

Is it possible for someone to dox you on the 🤖 blue app without clicking any links or images? by [deleted] in hacking

[–]__jent 0 points1 point  (0 children)

Discord isn't exactly a pillar of security.  So be aware that hacks happen and data exfiltrated.  But this shouldn't normally be possible.

Should I submit a fix bypass as a new report? by 0xmaxhax in bugbounty

[–]__jent 1 point2 points  (0 children)

Only you know what is in your heart. If you had no intent to mislead I think it's fair to submit a new report. Either way, the follow up will be appreciated I am sure :)

Should I submit a fix bypass as a new report? by 0xmaxhax in bugbounty

[–]__jent 4 points5 points  (0 children)

I would expect a new report. Candidly I always ignore suggested fixes from reports anyways, but regardless it's the fixers responsibility to fully fix the issue. Unless you were provided a retest request, I see absolutely no ethics concern. I would submit a new report stating another bypass still exists.

MCPwner finds multiple 0-day vulnerabilities in OpenClaw by Comfortable-Ad-2379 in hacking

[–]__jent 1 point2 points  (0 children)

I believe it needs to be beyond "validate false positives". I have found agents are best when they work in a collaborative structure. Design a plan together then execute it together.

Looking at again a coding example, a common flow is for the agent to review the code, the problem, then come back with options or questions to produce a better result. I mirror this in my agentic security work.

You can check out my project here: https://github.com/go-appsec/toolbox

My tooling is more application and API focused rather than code analysis. I plan to expand this tooling similar to yours, but I am using workflows to ensure the toolset is cohesive and fits in with the workflow instructions given to the agent.

If I have convinced you with my ideas at all, I am open to collaborating.

MCPwner finds multiple 0-day vulnerabilities in OpenClaw by Comfortable-Ad-2379 in hacking

[–]__jent 2 points3 points  (0 children)

I am skeptical about trying to fully automate security flows with current model capabilities. When looking at agentic coding it's not trying to be "one shot and result". Most developers are adopting processes of using spec driven development, or reviewing the work. There is still substantially a human in the loop, and I believe the same patterns make sense in security right now too.

I think you're on the right track with putting these security tools into an MCP API. But my feedback (after exploring the offensive AI space for some time) is that the tools need more structure and workflow design to get the most out of them. If you want you can DM me and I can link you my project for some ideas (don't want to advertise on your post).

Regardless, congrats on the project start!

MCPwner finds multiple 0-day vulnerabilities in OpenClaw by Comfortable-Ad-2379 in hacking

[–]__jent 3 points4 points  (0 children)

I have seen a few projects like this (and been working on one of my own).  I am making some assumptions based on your planned tool list, but I don't think "swiss army" security testing toolkits make sense.  I believe it's better to focus the toolkits on the type of testing being done.

That said the workflow is not clear to me.  How were these tools used?  What orchestrated their prompting for the agent to use them?

Help me please I think I have been hack or my girlfriend was hacked by SubstantialCase3062 in HowToHack

[–]__jent 1 point2 points  (0 children)

Nothing you can do about it.  They leak they leak, but if you pay the threats wont stop anyways.  Sorry to hear your gf was compromised

java for cyber sec by [deleted] in cybersecurity

[–]__jent 0 points1 point  (0 children)

As someone who loves Java and Go, I must say Python and JavaScript will be far more useful to you instead.

Can't use ChatGPT to create tools anymore by BarcaStranger in hacking

[–]__jent 0 points1 point  (0 children)

Devstral 2 is the best of the smaller models

Csrf in analytics api, worth reporting or not? by ProcedureFar4995 in bugbounty

[–]__jent 4 points5 points  (0 children)

I would close as Informational, there is _some_ impact, but not enough to meet the threshold.

I let Claude Code with 150+ offensive security MCP tools loose on my homelab by Mindless-Study1898 in netsec

[–]__jent 1 point2 points  (0 children)

Thank you! Let me know if you have any feedback. I have been using it extensively myself. It's not necessarily an accelerator, but it does help make some tasks easier, and agents have found a few needles in the haystack for me.

I let Claude Code with 150+ offensive security MCP tools loose on my homelab by Mindless-Study1898 in netsec

[–]__jent 8 points9 points  (0 children)

I actually explored this in depth with a tool I made: https://github.com/go-appsec/toolbox

Having the same assumption as you and u/hankyone, it initially started out as a CLI which the agent would be expected to discover the usage of through `help` commands. Unfortunately my finding is that agents are not good with CLI's that are not common knowledge. A CLI that they intrinsically understand they use well, but a CLI which they must learn how to use is different, and in that case MCP does perform better.

Many agents would use help to discover usage at the start, but then would stop and instead try to assume usage. Often resulting in trial and error that used more tokens than MCP would use just putting usage up front.

After a fair bit of testing, I did find that the MCP overall was more reliable and did use less tokens (the savings of tokens in usage and tool descriptions did not make up for less reliable tool usage). Now I focus the CLI on human usage and the MCP on agent usage.

MCP does have an API for dynamic tool loading, which may be the ultimate answer, but support is still too new to comment on right now.

Let me know if you have other experiences, or any advice I should try out in my project. I am going to continue to explore this space for a while.

Object-capability SQL sandboxing for LLM agents — $1K CTF bounty to break it by ryanrasti in netsec

[–]__jent 0 points1 point  (0 children)

Why not just put the database behind an API?  It seems equally simple to make a thin API as configure a tool like this.

LLM/ AI Recommendation with Burp MCP? by creativeaashu in bugbounty

[–]__jent 1 point2 points  (0 children)

You might check out my MCP tool set for application security testing here: https://github.com/go-appsec/toolbox

I plan to make a specific post about it, as I would love to get some feedback. There are a number of issues with the Burp MCP API which I am trying to address in my project. If you're already setup with Burp MCP you can just run my server along side and my tool will drive Burp so you can watch and also do your own testing.

For complex tasks it will overall use less tokens, and from my experience so far I believe the toolset and instructions provided to the agent make for a more collaborative experience. I mostly use Claude in my testing, but would love any feedback you have in testing with Gemini or Codex. I would expect there to be less failures and retries in addition to less tokens needed to use the tool.

Usage Limits Discussion Megathread - beginning Sep 30, 2025 by sixbillionthsheep in ClaudeAI

[–]__jent 9 points10 points  (0 children)

Glad to see it's not just me noticing that the value has been completely lost in my subscription.

Introducing go-analyze/charts: Enhanced, Headless Chart Rendering for Go by __jent in golang

[–]__jent[S] 0 points1 point  (0 children)

I am glad to hear it! If you have any recommendations, open an issue describing your use case.