51 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 72: If You Want to Grow—Stop Fixing the Wrong Problem 16:32
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
Manage episode 486631882 series 2086046
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our search for where LLMs are providing value to appsec. We also consider what indicators we'd look for as signs of success. For example, are LLMs driving useful commits to overburdened open source developers? Are LLMs climbing the ranks of bug bounty platforms?
In the news, more examples of prompt injection techniques against LLM features in GitLab and GitHub, the value (and tradeoffs) in rewriting code, secure design lessons from a history of iOS exploitation, checking for all the ways to root, and NIST's approach to (maybe) measuring likely exploited vulns.
Show Notes: https://securityweekly.com/asw-333
668 episodes
Manage episode 486631882 series 2086046
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our search for where LLMs are providing value to appsec. We also consider what indicators we'd look for as signs of success. For example, are LLMs driving useful commits to overburdened open source developers? Are LLMs climbing the ranks of bug bounty platforms?
In the news, more examples of prompt injection techniques against LLM features in GitLab and GitHub, the value (and tradeoffs) in rewriting code, secure design lessons from a history of iOS exploitation, checking for all the ways to root, and NIST's approach to (maybe) measuring likely exploited vulns.
Show Notes: https://securityweekly.com/asw-333
668 episodes
All episodes
×
1 Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339 1:07:50

1 Checking in on the State of Appsec in 2025 - Sandy Carielli, Janet Worthington - ASW #338 1:07:15

1 Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337 38:26

1 How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336 1:01:18

1 Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335 1:08:00

1 Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334 1:09:09

1 AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333 39:06

1 AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Brian Fox, Mark Lambert, Shahar Man - ASW #332 1:04:35

1 Appsec News & Interviews from RSAC on Identity and AI - Charlotte Wylie, Rami Saas - ASW #331 1:01:48

1 Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330 1:09:38

1 AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Idan Plotnik, Vishal Gupta - ASW #329 1:03:03

1 Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328 44:08

1 Managing Secrets - Vlad Matsiiako - ASW #327 1:03:03

1 More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326 1:14:45

1 In Search of Secure Design - ASW #325 1:07:36

1 Avoiding Appsec's Worst Practices - ASW #324 1:11:19

1 Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323 54:08

1 Redlining the Smart Contract Top 10 - Shashank - ASW #322 53:01

1 Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321 33:17

1 CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321 40:34

1 QR Codes Replacing SMS, MS Pulls VSCode Extension, Threat Modeling, Bybit Hack - ASW #320 33:55

1 Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320 35:08

1 Regex DoS, LLM Backdoors, Secure AI Architectures, Rust Survey - ASW #319 36:26

1 Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319 33:56

1 Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318 44:57

1 Unforgivable Vulns, DeepSeek iOS App Security Flaws, Memory Safety Standards - ASW #317 35:52

1 Code Scanning That Works With Your Code - Scott Norberg - ASW #317 37:01

1 New SLAP & FLOP Attacks, OCSP Fades Away, DeepSeek's ClickHouse, OAuth 2.0 Security - ASW #316 34:47

1 Threat Modeling That Helps the Business - Sandy Carielli, Akira Brand - ASW #316 36:54

1 Opengrep & Semgrep, Hacking Subarus, Hacking Synths, Stealing Cookies, and RANsacked - ASW #315 34:57
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.