Checkmarx Zero's Avatar

Checkmarx Zero

@checkmarxzero

Specializing in breaking and protecting the building blocks of modern software development. From traditional #AppSec, through #opensource #SupplyChain threats, to #LLM security. https://checkmarx.com/zero/

38
Followers
1
Following
313
Posts
25.03.2025
Joined
Posts Following

Latest posts by Checkmarx Zero @checkmarxzero

Preview
Unearned Confidence: AI Security Reviewers Don't Really Get It - Checkmarx AI-based security reviewers can be great helpers. But the gap between the certainty they express in their findings and the reality of their current capabilities can lead to problems. Understanding…

LLM-based tools are probabilistic, require significant context to get meaningful results, and make important mistakes in analysis that can mislead users.

But there's real value available IF you understand the strengths and limitations and use them wisely. Learn more: buff.ly/a6yvxiJ

05.03.2026 22:08 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

One of our senior security researchers, Alon Lerner, noted that security review commands and tools in LLMs definitely sound very confident in their results. But that confidence is often unearned.

05.03.2026 22:08 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Unearned Confidence: AI Security Reviewers Don't Really Get It - Checkmarx AI-based security reviewers can be great helpers. But the gap between the certainty they express in their findings and the reality of their current capabilities can lead to problems. Understanding…

AI-based security review tools are fascinating, so of course we've been pushing them to discover their strengths and limits.

Learn more: buff.ly/a6yvxiJ

05.03.2026 22:08 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
AI fights and more attacks on dev infrastructure: Last Week in AppSec for 4. March 2026 - Checkmarx Last week: an β€œAI bot” abusing GitHub Actions to run code and steal tokens, agent takeover paths from a single browser visit, and fresh reminders that npm packages and WordPress plugins can still…

Whoever had "AI attacks against GitHub Actions" on their #AppSec bingo card won this last week with the "hackerbot-claw" thing. We cover that story and more: buff.ly/F0NUqYS

#LastWeekInAppSec #AISecurity #SupplyChainSecurity #ApplicationSecurity #Cybersecurity

05.03.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GHSA-gv46-4xfq-jv58 - GitHub Advisory Database OpenClaw Vulnerable to Remote Code Execution via Node Invoke Approval Bypass in Gateway

πŸ“’ CVSS 10.0 Critical RCE disclosed in OpenClaw prior to 2026.2.14

Results in full host takeover, exposed when an attacker manages to authenticate to gateway, meaning this is an elevation of privilege allowing lateral movement and increased access.

Fixed in openclaw@2026.2.14.
πŸ“¦ buff.ly/SdbVpIJ

04.03.2026 15:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ‘©πŸΌβ€πŸ’» Config files in repos can be hijacked, in some cases causing Claude Code to run malicious commands without prompting the user

🐞 GitHub Issues with hidden prompts that cause serious problems when starting Codespaces that include Copilot

Read more: buff.ly/jD3gRHj

#ClaudeCode #GitHubCopilot #AI

26.02.2026 22:08 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Last Week in AppSec for 26. February 2026 - Checkmarx Last Week In AppSec saw public disclosures relating to AI code assistants trusting context that can be attacker-controlled.

Last Week In AppSec we're seeing yet more ways in which researchers are able to trick AI code assistants by abusing trust in sources of context: like configuration files in code repositories and the contents of bug reports.

Read more: buff.ly/jD3gRHj

#ApplicationSecurity #LastWeekInAppSec #AI

26.02.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Claude Code Security, and the Claude Code "security-reviewer" feature it's based on, gains its best security capabilities from the Opus 4.6 model. Is this model living up to the hype?

buff.ly/f8MVM1Y

#ClaudeCode #ApplicationSecurity #AppSec #AI #LLM #AISecurity

26.02.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

In that article, Darren lays out the problem as well as a strategy for putting controls in place that make your developers' lives easier while adding significant protection against the risk of #maliciousPackages through well-designed controls and lightweight policies

19.02.2026 14:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Protecting yourself against malicious open-source packages Malicious open-source packages like Shai-Hulud attack developers and infrastructure. But centralized package controls and API access to a malicious packages database can help protect you.

#Malware is targeting developers through #opensource libraries: we can't keep having our only response be telling devs to "be careful". And you can't just buy a product about it. You need a strategy for keeping your developers (and your CI/CD and production systems!) safe. buff.ly/Qbn7SGy

19.02.2026 14:37 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

βšͺ CVE-2026-24513 is a bypass of the protection afforded by the "auth-url" ingress when a misconfiguration is in place.

04.02.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ”΄ CVE-2026-1580 and CVE-2026-24512 allow for config #injection via the "nginx.ingress.kubernetes.io/auth-method" ingress annotation and the "rules.http.paths.path" ingress field, respectively.

🟑 CVE-2026-24514 is a #DoS in the ingress-nginx admission controller, triggered by sending large requests.

04.02.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - nginx/kubernetes-ingress: NGINX and NGINX Plus Ingress Controllers for Kubernetes NGINX and NGINX Plus Ingress Controllers for Kubernetes - nginx/kubernetes-ingress

⏳ With EOL in March, Ingress #NGINX has 4 newly disclosed vulnerabilities:
#CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514.

We recommend that you migrate to F5's NGINX Ingress: buff.ly/vqTJvPK
If you can’t migrate yet, update to v1.14.3.

More details on each CVE below.

04.02.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

We’re constantly shutting down attacks on developers, including in the #VSCode marketplace and the OpenVSX marketplace. And we’re super appreciative of the fast responses to our reports from their security teams. Working together makes the community safer!

30.01.2026 16:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Solidity devs targeted again: Malicious VS Code extension drops ScreenConnect-based remote access trojan (RAT) - Checkmarx A fake Solidity VS Code extension impersonated Juan Blanco and installed ScreenConnect/ConnectWise Control for remote accessβ€”takedown in 24h. IoCs + mitigation.

This attempt to compromise #Solidity / #Etherium developers was particularly aggressive: it didn’t just try to exfiltrate data, it installed a Remote Access Trojan. Not to worry, we got it shut down within a day.

πŸ‘‰ Read about it: buff.ly/9e55Xgy

30.01.2026 16:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Last Week in AppSec for 29. January 2026 - Checkmarx Denial of Service in Java SE and React server, and pnpm lets a directory traversal (Zip) slip in. Last week in AppSec.

Looking at the #LastWeekInAppSec, we see two widely-used application components with #DoS, and a nasty little path traversal in a package manager.

Details, mitigations, context for making risk-based decisions all on our blog: buff.ly/xL4NKOg

#React #NodeJS #Java #pnpm #npm #CVE #Vulnerability

29.01.2026 22:08 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Did you know Checkmarx Zero has a newsletter? Avoid the whims of The Algorithm: get an email synopsis when new Checkmarx Zero research or analysis is published on our blog, plus subscriber-exclusive content.

Visit buff.ly/Ao3m5kC and click on the "Subscribe" control at the bottom.

28.01.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Exploit guidance from researchers or adversaries often increases the risk of exploitation in the future, accelerating development of adversarial automation. This data is important for defenders as well, but it's important to be mindful of the increased risk that comes with.

27.01.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Due to detailed #exploit guidance in the wild, the priority of patching this #Redis XACKDEL #vulnerability increased this week. CVE-2025-62507 buff.ly/NJvVjvS

‼️ if you haven't yet upgraded your Redis installs, you should increase the priority of that.

#CVE #ApplicationSecurity #ProductSecurity

27.01.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
An email message, with personal information redacted, showing that Checkmarx Zero reached out to the VSMarketplace team on 31. Oct 2025 about the ChatMoss / WhenSunset extension's suspicious behavior

An email message, with personal information redacted, showing that Checkmarx Zero reached out to the VSMarketplace team on 31. Oct 2025 about the ChatMoss / WhenSunset extension's suspicious behavior

Yes, we heard about the #ChatMoss / #WhenSunset #VSCode extension that appears to be malicious. We reported it to the marketplace on 31. Oct 2025. It's not new, it's not news, but it is a good reminder to be cautious; marketplaces don't always remove sketchy extensions.
#Malware #SupplyChainSecurity

23.01.2026 17:45 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

As of 16. Jan 2026, this chart shows the number of #CVE submissions in "Awaiting Analysis" status in the US-NVD

Unless something changes with #NVD's capacity (which seems unlikely given NIST's current priorities), we as an industry need to find a different path. This isn't sustainable.

20.01.2026 14:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Last Week in AppSec for 15. January 2026 - Checkmarx Potentially serious flaws, depending on your uses, in sigstore, n8n, and pnpm made last week in appsec all about tools in the software supply chain.

This #LastWeekInAppSec is a great reminder that automation and dev tooling is part of an organizations attack surface. #Sigstore, #pnpm, and #n8n all have vulns to pay attention to, but (mostly) not panic over.

πŸ‘‰ should you worry? read: buff.ly/ATRNVz3

#AppSec #ProductSecurity #DevSecOps #DevOps

15.01.2026 17:07 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

CVE-2026-22688: #CommandInjection in #MCP stdio configuration in #WeKnora. Authenticated users can inject commands into the MCP stdio settings, causing the server to create subprocesses and executing the injected commands. buff.ly/CyMafWP

Update to v0.2.5 or higher!

13.01.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

🚨 Alert #WeKnora users! 2 High Severity #CVEs were released.
CVE-2026-22687: #SQLi in the Agent service DB query tool. Due to insufficient backend checks an attacker can use prompt‑based bypass to avoid query restrictions and obtain sensitive information from the server and DB. buff.ly/kQXicrG

13.01.2026 22:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
HITL Dialog Forging (aka Lies-in-the-Loop) | OWASP Foundation HITL Dialog Forging (aka Lies-in-the-Loop) on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.

Checkmarx Zero has contributed some of our work on Lies-in-the-Loop to the OWASP foundation. Thanks to our own Ori Ron for the efforts there, and to the OWASP community for the review and process of getting this important attack pattern documented with OWASP

See: buff.ly/KNzcahw

13.01.2026 15:42 πŸ‘ 4 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ”Ž IoCs include
meow[.]undefined21[.]com:8040
c[.]undefined21[.]com:4444
ScreenConnect.ClientSetup.msi?e=Access&y=Guest
/tmp/.test.py
~/Library/LaunchAgents/com.example.testscript.plist
~/.config/systemd/user/testscript.service
%TEMP%\extension.bat
🧡 3/3

09.01.2026 18:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Windows: drops UAC-elevated script, adds Defender exclusion & installs ScreenConnect from meow[.]undefined21[.]com:8040.

macOS & Linux: drops Python reverse shell to c[.]undefined21[.]com:4444.
🧡 2/3

09.01.2026 18:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

🚨 Malicious VS Code extension impersonating Solidity publishers: juanblan281.solid281 ; drops persistent remote-access kits on Windows, macOS, and Linux. If found on machines, quarantine and clean carefully. 🧡 1/3

#VSCode #Malware #AppSec #Developer #Solidity

09.01.2026 18:12 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
Last Week in AppSec for 08. January 2026 - Checkmarx React2Shell keeps going, Shai-Hulud doesn't. MongoDB and RustFS have problems. AdonisJS could write arbitrary files. 08. January 2026: Last Week In AppSec

It's been a busy couple of weeks for #AppSec; including ongoing named vulns like React2Shell and MongoBleed, because what's a #vuln without a Brandβ„’? Also AdonisJS, RustFS, and the Shai-Hulud that didn't happen

πŸ“‘ READ more: buff.ly/xbVornQ

#JavaScript #npm #MongoDB #React #Rust

08.01.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Unrestricted Upload of File with Dangerous Type in n8n - CVE-2026-21877 - DevHub n8n is affected by an authenticated Remote Code Execution (RCE) vulnerability. Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service.…

🚨 CVE-2026-21877 – #RCE in #n8n via Arbitrary File Write

Authenticated users may upload crafted files that could trigger remote code execution, potentially leading to full instance compromise, affecting both self-hosted and cloud instances.

Patch version 1.121.3+.
More information:

07.01.2026 14:48 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0