[tl;dr sec] #306 – Claude Code’s Hacking Campaign, Rust in Android, Secrets Scanners Miss

[tl;dr sec] #306 - Claude Code's Hacking Campaign, Rust in Android, Secrets Scanners Miss

I hope you’ve been doing well!

I’m stoked to announce I’ll be doing a webinar with my friend Daniel Miessler on his epic AI setup.

Daniel has spent maybe more time than anyone I know on his personal AI infrastructure.

So I’m stoked to have him walk through his setup, do some live demos, and answer your questions.

  • Building out Claude Code as your command center.

  • A maturity model for integrating AI into your work.

  • Recent developments and how best to use them: Skills, sub-agents, etc.

  • “Productionizing” your AI infra and tactical tips: ensuring the right agents and skills are called, structuring context for easy agent retrieval, automatically managing agent history, coordinating between agents, tool calling, etc.

  • And more!

Hope to see you there  

P.S. No tl;dr sec next week due to Thanksgiving! Hope you get some time to relax with people you care about.

Altered Security offers multiple Red Team courses for on-prem and cloud with affordable and enterprise-like hands-on labs. 

Highlights of Altered Security courses:

  • Industry recognized certifications like Certified Red Team Professional (CRTP), CRTE, CARTP and more. 

  • Easy to access and huge enterprise-like labs.

  • Designed by Black Hat USA and DEF CON veterans. 

  • Trained more than 40K professionals from 130+ countries and 500+ organizations. 

Get 20% OFF on all courses in our Black Friday deals until December 17, 2025. No coupon code required.

Courses and online labs have really helped me level up my hands-on knowledge over the course of my career. Take a look if you want to gain some red team experience  

AppSec

Secrets Story: The Prefixed Secrets That Tried%20to%2BGetnAway
Semgrep’s Lewis Ardern describes how secret scanning tools miss valid leaked secrets due to over-reliance on false positive reduction techniques like non-word boundaries and keywords. He found hundreds of valid GitHub, OpenAI, Anthropic, and other tokens publicly leaked on GitHub that went undetected by popular scanning tools.

Secret detection is actually surprisingly complex and nuanced, which this post does a good job at demonstrating with concrete examples. If you want to get into the nitty gritty, check it out.

Effortless Web Security: Secure by Design in the Wild
Aaron Shim shares two Google initiatives to support by Secure by Design in web development: contributing to the W3C Secure Web Application Guidelines (SWAG) Community Group and introducing Auto-CSP in Angular. The W3C group has some great documentation on common vulnerability classes, and discusses best practices and guidelines for web developers and maintainers of important web dependencies.

Auto-CSP in Angular automatically generates Content Security Policy configurations during build time. CSP is a great defense against XSS, but tough to do in practice. Auto-CSP works by rewriting all