A deep dive into a powerful local privilege escalation exploit that abuses Linux's cryptographic sockets and the page cache. We explore how it works, why it gives passwordless root access, and how container runtimes stop it.
Posts for: #security
Securing coding agents: from banned tools to the Confused Deputy
Building a secure sandbox for an AI coding agent is a fascinating game of cat and mouse. From shell injection to OS-level sandboxing, here is why blocking tools isn't enough, and why treating agent output as untrusted code is the only way forward.
SSH into your homelab from anywhere using Tor
How to set up a Tor hidden service to SSH into a remote machine without opening ports, configuring NAT, or exposing your server to the internet.