Brendan Dolan-Gavitt's Avatar

Brendan Dolan-Gavitt

@moyix.net

AI researcher at XBOW. Security, RE, ML. PGP http://keybase.io/moyix/

2,950
Followers
882
Following
78
Posts
03.07.2023
Joined
Posts Following

Latest posts by Brendan Dolan-Gavitt @moyix.net

Very kind! :) I feel a bit guilty for not being able to maintain it properly, but I ended up backing a losing horse (NVIDIA’s Triton inference engine, which they have now fully deprecated) and the cost of switching to something else was too high

10.02.2026 18:15 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Episode 23: War Stories with Brendan Dolan-Gavitt (XBOW)!

@tib3rius.bsky.social & @swiftsecur.bsky.social are joined by @moyix.net who shares some AI and human war stories with us!

Links below!

07.11.2025 15:03 πŸ‘ 5 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Preview
Black Hat Black Hat

"AI Agents for Offsec with Zero False Positives" by @moyix.net

The title threw me off originally, but it's not wrong! IMHO it's the archetypal pattern of good LLM usage: they suck at *verifying* but in some domains are quite freakishly good at *proposing.*

14.08.2025 18:25 πŸ‘ 6 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

I had an amazing time at NYU and am particularly grateful to have had the opportunity to meet and advise so many incredible students. But right now is a unique moment in the history of computer science and I believe it’s one that, for me, is best pursued outside of academia.

30.07.2025 00:35 πŸ‘ 5 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0

So, I’m not sure there is any good time to announce this, but as of August 31st I will be leaving NYU for good, to seek my fortune in industry with XBOW!

30.07.2025 00:35 πŸ‘ 18 πŸ” 0 πŸ’¬ 5 πŸ“Œ 0
Post image

False positives waste your time.
False negatives cost you breaches.

At @BlackHatEvents , @moyix shows how XBOW agents fight false positives β€” validating real exploits at scale, in hours.

πŸ“Aug 7 | 11:20am

28.07.2025 15:02 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

I think this is the coolest of the vulns / exploits it came up with on our climb to #1 on HackerOne, but I am open to the possibility that it will find something even cooler tomorrow :)

28.07.2025 22:15 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Such a cool exploit needs commensurately cool bling, so Alvaro (who wrote up the excellent post on this vuln) created this lovely little TUI so you can watch as it exfiltrates files from your server byte by byte

28.07.2025 22:14 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

So how do you precisely read a byte? Easy: you ask for the pixel histogram of a raw image consisting of byte [i...i+1] of the file. And you get back something like

histogram: [0, 0, 1, 0, 0], [59.8, 59.9, 60.0, 60.1, 60.2]

Telling you that the byte is ASCII 60 ('<')

28.07.2025 22:13 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The second trick is also quite lovely. It had found that it could read arbitrary files, but how to return the data? The secret was in a /statistics endpoint that, among other things, could provide a histogram of the pixel values.

28.07.2025 22:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image Post image

To decode it, XBOW had to realize that the file contents had been encoded using an encoding that stores pixels as deltas from the previous pixel. So cool!

28.07.2025 22:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

There are not one, but two different super-cool exfil tricks in this post. The first gets the app to exfiltrate the content of an arbitrary URL by encoding its bytes as raw pixels, giving the image we saw earlier.

28.07.2025 22:11 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
XBOW – Another Byte Bites the Dust - How XBOW Turned a Blind SSRF into a File Reading Oracle A complete arbitrary local file read vulnerability achieved through an ingenious byte-by-byte exfiltration technique.

The trick to how it did it is in this post: xbow.com/blog/xbow-ti... Some details below...

28.07.2025 22:10 πŸ‘ 8 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
A screenshot of OSX preview, showing an image "output.png" with a file encoded as greyscale pixel data. The image is a long, thin strip going from left to right with various greyscale pixels.

A screenshot of OSX preview, showing an image "output.png" with a file encoded as greyscale pixel data. The image is a long, thin strip going from left to right with various greyscale pixels.

Can you read the exfiltrated file encoded in this image? @xbow.com figured out how to :D

28.07.2025 22:09 πŸ‘ 5 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1

Thanks! Should be fixed

25.07.2025 11:51 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

This one and the sequel (coming out next week) are among my favorite bugs we found. It turns out GIS does NOT stand for β€œGood Information Security”

25.07.2025 00:47 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Any grad student could tell you that's not true. You can get free lunch by just showing up to the start of the seminar, grabbing a slice of pizza, and getting away while the speaker is trying to get their laptop connected to AV

18.07.2025 19:18 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

All credit here to Albert Ziegler, who came up with the idea and wrote a beautifully clear post about it :D I think this blog is also the most info we've released about how our agent actually works!

17.07.2025 17:39 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
XBOW – Agents Built From Alloys A simple, powerful innovation boosts performance in agentic AI systems.

Given two models with unique strengths, can we combine them to get the benefits of both w/o extra model calls? It turns out yes: just flip a coin at each turn to decide which model to query! This gave a jump from 25% to 55% on our benchmarks! xbow.com/blog/alloy-a...

17.07.2025 17:35 πŸ‘ 7 πŸ” 1 πŸ’¬ 2 πŸ“Œ 1
Preview
XBOW – XBOW battles Ninja Tables: Who’s the Real Ninja? Sharing the story of how XBOW sniffed out a sneaky arbitrary file read bug in the popular WordPress Ninja Tables plugin.

Loved this 0day @xbow.com found in a popular wordpress plugin, and IMO it shows the value added by the LLM - a scanner can't find this automatically without realizing there's a nonce you need to extract & include in the request. You need that extra bit of context: xbow.com/blog/xbow-ni...

15.07.2025 23:05 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

So... anyone else going to SummerCon today or tomorrow? I should be stopping by both days, for the first time in many years!

11.07.2025 14:20 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Easy:
0: not interesting or true
1: interesting
2: true
3: interesting and true

30.06.2025 22:37 πŸ‘ 2 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0

Yeah! Thinking back to even 18 months ago, it's kind of crazy to me that LLM agents actually kinda work?

30.06.2025 19:52 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

A lovely little XXE that XBOW found in Akamai Cloudtest leading to arbitrary file read! I like the error-based exfil technique: "yes please access the file named <contents of /etc/passwd> for me thx"

30.06.2025 19:45 πŸ‘ 6 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
AI Agents Are Getting Better at Writing Codeβ€”and Hacking It as Well One of the best bug-hunters in the world is an AI tool called Xbow, just one of many signs of the coming age of cybersecurity automation.

One of the best bug-hunters in the world is an AI tool called Xbow, just one of many signs of the coming age of cybersecurity automation.

25.06.2025 17:07 πŸ‘ 68 πŸ” 9 πŸ’¬ 1 πŸ“Œ 0

This is the first of a series of posts we're doing on some of the vulns found as part of the HackerOne work – we have lots more fun ones coming up about some great SSRF, SQLi, and RCE vulns it discovered, with very clever exploit techniques :)

24.06.2025 20:07 πŸ‘ 8 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

It has been great fun building this and watching it deliver a steady stream of real vulnerabilities in live sites! If you're curious how we did it, @nicowaisman.bsky.social has a new post: xbow.com/blog/top-1-h...

24.06.2025 20:01 πŸ‘ 10 πŸ” 2 πŸ’¬ 0 πŸ“Œ 1
Video thumbnail

For the first time in history, the #1 hacker in the US is an AI.

(1/8)

24.06.2025 19:41 πŸ‘ 16 πŸ” 7 πŸ’¬ 1 πŸ“Œ 3
Preview
The Rise of β€˜Vibe Hacking’ Is the Next AI Nightmare In the very near future, victory will belong to the savvy blackhat hacker who uses AI to generate code at scale.

for Wired I explored the horrible future of vibe hacking. It's not great!

04.06.2025 16:13 πŸ‘ 45 πŸ” 7 πŸ’¬ 1 πŸ“Œ 1

Do you want to work at the cutting edge of AI and cybersecurity?

XBOW now has 8 positions open across Product Marketing, Operations, Customer Success, and Engineering.

Check out all the details here: jobs.ashbyhq.com/xbowcareers.

28.05.2025 17:20 πŸ‘ 5 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1