Secure Vibe Coding in 2026: The Files, Prompts and Rules of Use and Research
Writeups, research, and practical security notes from my Medium.
I’ll graduate from University of Maryland, College Park in May 2026, completing my Master’s in Cybersecurity and a Graduate Certificate in Cloud Engineering.
I’m looking for full-time Security Engineering, IR/SOC, or AppSec roles, and I’m open to relocating.
My work focuses on building and automating security systems, especially around log analysis, threat modeling, incident triage, and AI-assisted security workflows.
I also write technical blogs, contribute to open-source security tools, and build projects that simulate real-world attacks and defensive response.
I'll be graduating from the University of Maryland, College Park in May 2026, currently finishing my Master’s in Cybersecurity along with a Graduate Certificate in Cloud Engineering.
I'm actively looking for a full-time role in Security Engineering, IR/SOC Analyst, or AppSec roles, and I am open to relocating.
I focus more on builing and automating security Systems. A large part of my work involves automation and AI/LLM-assisted security workflows, especially for log analysis, threat modeling, and incident triaging.
I do write a lot of Blogs, building and contributing to open-source security tools, experimenting new AI/LLM, and work on projects that simulate real-world attacks and defensive response.
Let's stay in touch :)
Emulating adversary techniques and automating D&R with LimaCharlie, Tines and Slack
Learn More →AI-powered AWS security scanner that chains misconfigurations into attack paths
Learn More →Emulating adversary techniques and automating D&R with LimaCharlie, Tines and Slack
An automated vulnerability scanning pipeline which involves Cloud, AI and Security Integration.
PowerShell-based automation sets up your Obsidian vault to sync with a private GitHub repo
vm2 — NodeVM denylist bypass via process + inspector/promises → host RCE.
Refs: heise.de, securityonline.
PraisonAI Platform — cross-workspace IDOR + members can self-promote to admin/owner via unprotected member-management routes.
PraisonAI — unauthenticated arbitrary file read via MCP workflow.show / workflow.validate / deploy.validate handlers.
vm2 — NodeVM network deny bypass via internal _http_client / _http_server escapes the network policy.
Weblate — JS localization CDN add-on allows arbitrary local file read outside the repository.
Unifiedtransform v2.0 — broken access control on /students/edit/{id} lets students/teachers modify any student record.
Unifiedtransform v2.0 — broken access control on /course/edit/{id} lets any user modify course data.
Weblate — authenticated SSRF via redirect bypass of ALLOWED_ASSET_DOMAINS in screenshot URL uploads.
Statamic — authenticated LFI in file dictionary fieldtype reads arbitrary .json/.yaml/.csv from server.
vm2 — NodeVM observability builtins leak host process metadata and in-flight HTTP request data.
Parse Server — MFA recovery code single-use bypass via concurrent login requests.
/students/edit/{id} and modify
student records. Affects all v2.0 builds/course/edit/{id} and modify
course data. Affects all v2.0 buildsOriginal Research
Writeups, research, and practical security notes from my Medium.
Writeups, research, and practical security notes from my Medium.
Writeups, research, and practical security notes from my Medium.