Adversarial & AI Security.

AI security, MCP server reviews, and red-team write-ups across smart contracts, dApps, and Web2 infrastructure.

Filter
Showing 12 of 21
Anthropic MCP SDK Vulnerability (April 2026): Full Analysis
Adversarial & AI SecurityMay 15, 2026·12 min

Anthropic MCP SDK Vulnerability (April 2026): Full Analysis

Inside the April 2026 Anthropic MCP SDK design flaw: STDIO transport allows config-to-command-execution across Python, TypeScript, Java, Rust SDKs — by design.

Read
OWASP ASI04 Explained: Agentic Supply Chain Attacks
Adversarial & AI SecurityMay 12, 2026·12 min

OWASP ASI04 Explained: Agentic Supply Chain Attacks

OWASP ASI04 (Agentic Supply Chain Vulnerabilities) explained: MCP Impersonation, malicious tools, trojanised connectors. Real CVEs, attack patterns, mitigations.

Read
MCP Vulnerabilities 2025-2026: 16+ CVEs & Breach Index
Adversarial & AI SecurityMay 8, 2026·13 min

MCP Vulnerabilities 2025-2026: 16+ CVEs & Breach Index

Complete MCP vulnerability index: 16 disclosed breaches and 14+ CVEs since April 2025 across Anthropic, Cursor, Postmark — with OWASP ASI04 patterns. Updated weekly.

Read
How to Build Your Own AI Auditor Agent (Interactive Guide, Multiple Paths)
Adversarial & AI SecurityMay 7, 2026·14 min

How to Build Your Own AI Auditor Agent (Interactive Guide, Multiple Paths)

Build an AI auditor agent that actually works. Multiple paths modeled after the best existing tools, benchmarked against 118 real Code4rena findings.

Read
Supply Chain Attacks in Web3 — From NPM to Protocol Exploits
Adversarial & AI SecurityMay 6, 2026·12 min

Supply Chain Attacks in Web3 — From NPM to Protocol Exploits

Complete guide to Web3 supply chain attacks with 5 vectors, real incidents, and actionable checklist.

Read
Safeguard: Analysis of Customer Agent Orchestration System
Adversarial & AI SecurityApr 12, 2026·26 min

Safeguard: Analysis of Customer Agent Orchestration System

Understand the Architecture and Security Layers of a Customer Agent Orchestration System

Read
Why AI security needs pentesting, red teaming, and audits together
Adversarial & AI SecurityApr 7, 2026·20 min

Why AI security needs pentesting, red teaming, and audits together

Pentesting finds bugs, red teaming tests defenses, audits prove compliance. Learn why AI security demands all three integrated into one TEVV lifecycle.

Read
How to Harden an MCP Server Before It Becomes a Master Key to Your Infrastructure
Adversarial & AI SecurityApr 1, 2026·21 min

How to Harden an MCP Server Before It Becomes a Master Key to Your Infrastructure

Secure your MCP servers against prompt injection, credential theft, and supply chain attacks. A practical hardening guide for identity, transport, and runtime.

Read
AI trading bot security: 5 critical attack vectors in DeFi
Adversarial & AI SecurityMar 30, 2026·21 min

AI trading bot security: 5 critical attack vectors in DeFi

Five systemic vectors targeting AI trading bots — adversarial ML, data poisoning, prompt injection, API exploits, supply chain compromise — with strategic mitigation.

Read
When AI controls DeFi vaults, prompt injection becomes remote code execution
Adversarial & AI SecurityMar 25, 2026·16 min

When AI controls DeFi vaults, prompt injection becomes remote code execution

How prompt injection drains AI-controlled DeFi vaults. Freysa and AiXBT exploits analyzed, EVMbench data, and defense architecture for autonomous agents.

Read
The Weakest Link in DeFi Isn't the Smart Contract — It's the Web App
Adversarial & AI SecurityFeb 28, 2026·15 min

The Weakest Link in DeFi Isn't the Smart Contract — It's the Web App

DNS hijacks, supply chain attacks, and UI social engineering bypass smart contract security entirely. Learn how attackers exploit web apps to drain DeFi protocols and how to stop them.

Read
When Web2 Infrastructure Breaks DeFi: The Hidden Attack Surface
Adversarial & AI SecurityFeb 16, 2026·13 min

When Web2 Infrastructure Breaks DeFi: The Hidden Attack Surface

DeFi's biggest hacks didn't start in Solidity. DNS hijacking, UI injection, and cloud misconfigurations have drained billions. Learn how Web2 infrastructure failures become on-chain exploits and what your team can do to prevent them.

Read