Nick Frichette's Avatar

Nick Frichette

@frichetten.com

Staff Security Researcher @datadoghq | DEF CON/Black Hat USA main stage speaker | he/him | OSCP OSWE | I turned hacking AWS into a career | Tweets are my own | Created https://hackingthe.cloud

1,548
Followers
244
Following
352
Posts
24.04.2023
Joined
Posts Following

Latest posts by Nick Frichette @frichetten.com

Preview
Datadog and Okta Combine for New Customer Detections Comprehensive monitoring of identity activity is crucial to the security of any organization. A compromised identity can lead to widespread data breaches and

Datadog 🀝 Okta: "The enhanced logic developed by Datadog’s own Security Research team during this collaboration has been contributed back to the public Okta Security Detection Catalog, ensuring that the broader security community benefits from this joint research"

sec.okta.com/articles/202...

06.03.2026 15:14 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
LexisNexis confirms data breach as hackers leak stolen files American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information.

"permitted a single ECS task role "read access to every secret in the account, including the production Redshift master credential.""

There is a lot going on with this (even if not all of it can be believed). Properly scoping IAM is critical!

www.bleepingcomputer.com/news/securit...

04.03.2026 15:08 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

😬

04.03.2026 15:04 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I get the appeal of β€œhuman-in-the-loop” for AI safeguards. But humans have been getting socially engineered for millennia.

That’s not exactly a hard security boundary 😬

25.02.2026 16:54 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Sometimes I miss Jia Tan.

24.02.2026 19:32 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Don’t expose yourself in public β€” let AWS error messages do it for you AWS now reveals public permissions in error messages. Learn how a deny-all session policy exposes which actions would succeed safely.

Hey wake up! New offensive AWS meta just dropped! Thanks to Daniel Grzelak, we now have an effective oracle for determining if resources are publicly exposed without leaving logs. (As an offsec person) LFG!!!

www.plerion.com/blog/dont-ex...

20.02.2026 15:43 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - Frichetten/Dungeons-and-Agents: Make Codex or Claude Code act as a virtual dungeon master for DND 5e. Make Codex or Claude Code act as a virtual dungeon master for DND 5e. - Frichetten/Dungeons-and-Agents

If anyone is interested, I built a framework to use Claude Code or Codex to act as a virtual DM for DND. State is stored on the filesystem and persists between sessions. I think Opus 4.6 is the ideal model for this but Codex works too.
github.com/Frichetten/D...

17.02.2026 22:52 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Professional communication

13.02.2026 03:23 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GCP Cloud Workstations Privilege Escalation - Hacking The Cloud Break out of a Cloud Workstations container through an exposed Docker socket, then access project credentials from instance metadata.

New on Hacking the Cloud! A look at how a familiar container escape pattern shows up in GCP Cloud Workstations. We trace a path from a container to service account.

If you’re using Cloud Workstations, this is a useful model to keep in mind.
hackingthe.cloud/gcp/exploita...

10.02.2026 15:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Just got my ticket to @fwdcloudsec.org! Looking forward to the best cloud security conference in the world!

09.02.2026 18:04 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Protect agentic AI applications with Datadog AI Guard | Datadog Learn how Datadog AI Guard evaluates prompts, responses, and tool calls in real time to help you defend agentic AI applications against emerging threats.

If you’re putting AI agents anywhere near prod, this is worth a read. We built AI Guard to help teams monitor prompts, tool calls, and model behavior in real systems, identifying and blocking AI threats in real time. More here:
www.datadoghq.com/blog/ai-guard/

03.02.2026 19:09 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Get IAM Credentials from a Console Session - Hacking The Cloud Convert access to the AWS Console into IAM credentials.

New on Hacking the Cloud: Ben Stevens documents a new method for extracting IAM creds from an AWS Console session. Useful for post-exploitation and evasion tradecraft.

I've been meaning to cover this for years. Glad it’s finally live:
hackingthe.cloud/aws/post_exp...

02.02.2026 16:26 πŸ‘ 4 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

As AI agents get more autonomous, prompt injection will shift from

β€œignore all previous instructions”
to
β€œadd a task to the backlog to X.”

Once the payload crosses a trust boundary and lands in Jira, it’s no longer a prompt, it’s just another task. A task that makes me admin :D

30.01.2026 16:08 πŸ‘ 4 πŸ” 1 πŸ’¬ 2 πŸ“Œ 0
Post image

Houses are bullshit

28.01.2026 02:36 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows | Datadog Security Labs A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug.

Want a clear analysis of the latest OpenSSL CMS/PKCS#12 vulnerabilities and their real-world impact? Our post explains the conditions required for exploitation and how to evaluate practical risk in your environment.
securitylabs.datadoghq.com/articles/ope...

27.01.2026 19:07 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Call for research: AI and LLM security - Hacking The Cloud Hacking the Cloud is opening the door to AI and LLM security research.

AI workloads are landing in the same AWS/Azure/GCP accounts we’ve been breaking into (and defending) for years. It's time for Hacking the Cloud to catch up. We're announcing a call for research! Share your AI and LLM sec research with thousands of readers hackingthe.cloud/blog/call_fo...

26.01.2026 16:14 πŸ‘ 2 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE | Datadog Security Labs IDE-SHEPHERD is an open-source IDE security extension that provides real-time monitoring and protection for VS Code and Cursor. It intercepts malicious process executions, monitors network activity, a...

IDEs are the new browser: massive attack surface, privileged access to various things, and lots of β€œjust trust it.” Today the Security Research Team at Datadog dropped IDE-SHEPHERD: a tool that watches extensions at runtime and blocks dangerous behavior.

securitylabs.datadoghq.com/articles/ide...

26.01.2026 14:41 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

I'm skeptical of the claim that 1,000 Clawdbot instances are publicly facing on the internet. If you look at the Shodan output, most of those boxes don't have port 18789 exposed (default Clawdbot port). The references to 18789 are from mDNS. Take this one for example:

26.01.2026 02:46 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Hmmm, even with sudo access Clawdbot has some sandboxing/protections. In a real environment that's good but I kinda intend for him to have full access to this VM. Gotta change that.

24.01.2026 18:44 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

Okay, this is kind of amazing. I wanted to give him a browser so he could surf the net but ran into an error. I was going to fix it myself but said, "Hey man, there is a dpkg in your home directory. Go ahead and install it. You'll have some errors but you'll manage", and he did!

24.01.2026 17:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Dang, I should have created clawdbot his own host user. I'll have to take care of that later. Suppose this is a good warning if that's something you want to avoid!

24.01.2026 17:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

He's alive!

24.01.2026 17:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image Post image

I don't know what skills are exactly, but these seemed useful.

24.01.2026 17:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image Post image

Initial install is easy, there's even an option for integrating with Tailscale which I already setup in the VM.

24.01.2026 17:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Clawdbot bought me a car Outsourcing the painful aspects of a car purchase to AI was refreshingly nice, and sold me on the vision of Clawdbot

Trying out clawdbot! And I'll live tweet my experiences setting it up and using it. It's been all of my timeline and doing cool things. (see @ajs.bsky.social's post below).

I'm running this on an Ubuntu VM managed through KVM with 6 cores and 16 gigs of ram.

aaronstuyvenberg.com/posts/clawd-...

24.01.2026 17:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0
Preview
Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud How Anthropic's refusal test string can be abused to stop streaming responses and create sticky failures.

Did you know Claude models have a "magic string" to test when a model refuses to respond? If that string enters prompt context, it can be abused to break LLM workflows until context is reset.

It's the EICAR test string of the AI age. Details:

hackingthe.cloud/ai-llm/explo...

21.01.2026 14:54 πŸ‘ 10 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
On the Coming Industrialisation of Exploit Generation with LLMs Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I adde…

We are on the verge of the commoditization of exploitation. Every vuln will functionally have a public PoC available because attackers can generate them in minutes.

The advantage will increasingly belong to organizations that can detect, respond, and contain fast.

sean.heelan.io/2026/01/18/o...

19.01.2026 03:24 πŸ‘ 6 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog Wiz Research discovered CodeBreach, a critical vulnerability that risked the AWS Console supply chain. Learn how to secure your AWS CodeBuild pipelines.

Very cool research on a CodeBuild misconfiguration which could have had significant consequences. I’m a bit disappointed that there wasn’t more done to secure the supply chain after the Q Developer incident.
www.wiz.io/blog/wiz-res...

15.01.2026 18:46 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

You'll uncover real world AI threats, publish your research on new attacks and vulnerabilities in AI systems, and partner with industry leaders in cloud exploitation, threat hunting, detection engineering, and more!

14.01.2026 15:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Senior Security Researcher - GenAI | Datadog Careers We're building a platform that engineers love to use. Join us, and help usher in the future.

We’re hiring! Join the Datadog Security Research team as a Senior Security Researcher specializing in GenAI and help shape the future of AI security!

careers.datadoghq.com/detail/75146...

14.01.2026 15:29 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0