<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Hamza</title>
    <description>The latest articles on Forem by Hamza (@lord-pendragon).</description>
    <link>https://forem.com/lord-pendragon</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3793283%2F7208a515-19cc-46fb-adef-8bc618e5b120.jpeg</url>
      <title>Forem: Hamza</title>
      <link>https://forem.com/lord-pendragon</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/lord-pendragon"/>
    <language>en</language>
    <item>
      <title>AI Wargame at NDC Sydney &amp; Black Hat Asia</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Wed, 15 Apr 2026 02:33:22 +0000</pubDate>
      <link>https://forem.com/secdim/ai-wargame-at-ndc-sydney-black-hat-asia-3fbd</link>
      <guid>https://forem.com/secdim/ai-wargame-at-ndc-sydney-black-hat-asia-3fbd</guid>
      <description>&lt;p&gt;NDC Sydney and Black Hat Asia are only a week away.&lt;/p&gt;

&lt;p&gt;We will be hosting a workshop at NDC Sydney 2026 titled:&lt;br&gt;
Attack and Secure AI Apps – Wargame Edition&lt;/p&gt;

&lt;p&gt;What to expect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Working through the OWASP LLM Top 10 in a practical, exploit-first format&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Exploring MCP security considerations in modern AI application architectures&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Exploiting real-world LLM vulnerabilities in guided labs&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Implementing robust secure design patterns to harden AI systems&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We’ll close with an intense attack and defence wargame that brings everything together, .&lt;/p&gt;

&lt;p&gt;Check it out: &lt;a href="https://secdim.com/ndc" rel="noopener noreferrer"&gt;https://secdim.com/ndc&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Furthermore:&lt;/p&gt;

&lt;p&gt;We will be hosting a workshop at NDC Sydney 2026 titled:&lt;br&gt;
Attack and Secure AI Apps – Wargame Edition&lt;/p&gt;

&lt;p&gt;Come join a fun and educational attack and defence AI wargame. You will be given an AI chatbot. Your chatbot has a secret that should always remain a secret! &lt;/p&gt;

&lt;p&gt;Your objective is to secure your chatbot to protect its secret while attacking other players' chatbots and discovering theirs. The winner is the player whose chatbot survives the longest (king of the hill). &lt;/p&gt;

&lt;p&gt;All skill levels are welcomed, even if this is your first time seeing code, securing a chatbot, or playing in a wargame.Right at the start, there will be a briefing to show how to play in the wargame. &lt;/p&gt;

&lt;p&gt;Knowledge of the OpenAI Python SDK helps but is not a requirement. Each player has access to their chatbot source code repository where they can run, test, debug and push their changes.&lt;/p&gt;

&lt;p&gt;Check it out: &lt;a href="https://secdim.com/blackhat" rel="noopener noreferrer"&gt;https://secdim.com/blackhat&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>programming</category>
      <category>security</category>
      <category>news</category>
    </item>
    <item>
      <title>(CVE-2026-27489) - Two Incomplete Fixes for a Path Traversal Vulnerability in ONNX</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Wed, 01 Apr 2026 03:52:02 +0000</pubDate>
      <link>https://forem.com/secdim/cve-2026-27489-two-incomplete-fixes-for-a-path-traversal-vulnerability-in-onnx-56ic</link>
      <guid>https://forem.com/secdim/cve-2026-27489-two-incomplete-fixes-for-a-path-traversal-vulnerability-in-onnx-56ic</guid>
      <description>&lt;p&gt;We found a zero-day path traversal in ONNX — CVE-2026-27489.&lt;/p&gt;

&lt;p&gt;It took three patches to get fixed. We break down how the vulnerability survived each fix and what it takes to actually kill a traversal bug.&lt;/p&gt;

&lt;p&gt;👉 Full analysis: &lt;a href="https://secdim.com/blog/post/two-incomplete-fixes-for-a-path-traversal-vulnerability-in-onnx-cve-2026-27489-18075/" rel="noopener noreferrer"&gt;https://secdim.com/blog/post/two-incomplete-fixes-for-a-path-traversal-vulnerability-in-onnx-cve-2026-27489-18075/&lt;/a&gt; &lt;/p&gt;

</description>
      <category>programming</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>ai</category>
    </item>
    <item>
      <title>Github commits to supporting Linux Foundation's Alpha-Omega initiative</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Thu, 26 Mar 2026 02:40:54 +0000</pubDate>
      <link>https://forem.com/secdim/github-commits-to-supporting-linux-foundations-alpha-omega-initiative-j4h</link>
      <guid>https://forem.com/secdim/github-commits-to-supporting-linux-foundations-alpha-omega-initiative-j4h</guid>
      <description>&lt;p&gt;Github recently joined Anthropic, Amazon Web Services (AWS), Google, and OpenAI with a combined commitment of $12.5 million to support the Linux Foundation's Alpha-Omega initiative, which focuses on improving the security of critical open source projects.&lt;/p&gt;

&lt;p&gt;At SecDim, we work with open source. Our tools both use and contribute to the open source ecosystem.&lt;/p&gt;

&lt;p&gt;Our open source program provides developers with access to developer security training to help improve the security of their applications.&lt;/p&gt;

&lt;p&gt;Are you an open source dev? Get in touch, and we'll help you improve your code security.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://secdim.com/open-source/" rel="noopener noreferrer"&gt;https://secdim.com/open-source/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>programming</category>
      <category>security</category>
      <category>news</category>
    </item>
    <item>
      <title>Dangerous by Default: What OpenClaw CVE Record Tells Us About Agentic AI</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Tue, 24 Mar 2026 04:12:58 +0000</pubDate>
      <link>https://forem.com/secdim/dangerous-by-default-what-openclaw-cve-record-tells-us-about-agentic-ai-153m</link>
      <guid>https://forem.com/secdim/dangerous-by-default-what-openclaw-cve-record-tells-us-about-agentic-ai-153m</guid>
      <description>&lt;p&gt;Your AI assistant just received a WhatsApp message. It ran a shell command. Then it wrote new code and executed it. This is how OpenClaw works by design — and why 104 vulnerabilities appeared in 18 days.&lt;/p&gt;

&lt;p&gt;OpenClaw (previously known as Clawdbot and Moltbot) is an autonomous local AI agent that can write code, run shell commands, access files, send messages, and control a browser. &lt;/p&gt;

&lt;p&gt;It has become the fastest-growing GitHub repository in history. When the pace of development overtakes security scrutiny, bad things start to happen.&lt;/p&gt;

&lt;p&gt;👉 Read more: &lt;a href="https://secdim.com/blog/post/dangerous-by-default-what-openclaw-cve-record-tells-us-about-agentic-ai-18022/" rel="noopener noreferrer"&gt;https://secdim.com/blog/post/dangerous-by-default-what-openclaw-cve-record-tells-us-about-agentic-ai-18022/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>programming</category>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>NEW Firmware Challenges - Weekly Incidents</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Thu, 12 Mar 2026 03:14:52 +0000</pubDate>
      <link>https://forem.com/secdim/new-firmware-challenges-weekly-incidents-n98</link>
      <guid>https://forem.com/secdim/new-firmware-challenges-weekly-incidents-n98</guid>
      <description>&lt;p&gt;We just released a new set of Firmware Security challenges focused on common vulnerabilities in embedded and IoT devices, including exposed debug interfaces, hardcoded device credentials, fail-open logic, insecure firmware updates, weak secure boot, and insecure logging.&lt;/p&gt;

&lt;p&gt;⚡ Limited-time access&lt;br&gt;
Some of the challenges are free for a limited time in the Weekly Incident.&lt;/p&gt;

&lt;p&gt;Check it out now:&lt;br&gt;
👉 &lt;a href="https://secdim.com/news/firmware-challenges-weekly-incidents-17968/" rel="noopener noreferrer"&gt;https://secdim.com/news/firmware-challenges-weekly-incidents-17968/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>iot</category>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>LangChain load() is basically eval()</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Tue, 10 Mar 2026 06:50:26 +0000</pubDate>
      <link>https://forem.com/secdim/langchain-load-is-basically-eval-5bjj</link>
      <guid>https://forem.com/secdim/langchain-load-is-basically-eval-5bjj</guid>
      <description>&lt;p&gt;In December 2025, CVE-2025-68665, a high-severity vulnerability (CVSS 8.6) was reported on LangChain. The vulnerability was an insecure deserialisation where an adversary could hijack secrets (e.g. OpenAI API keys), and depending on the set of allowed constructors (and their side effects), it could be escalated into arbitrary code execution.&lt;/p&gt;

&lt;p&gt;The patch for LangChain vulnerability CVE-2025-68665  disables loading secrets from environment variables by default, and introduces an escape wrapper to prevent injection. This is good, however, the underlying functionality is insecure-by-design and the root-cause has not been addressed.&lt;/p&gt;

&lt;p&gt;Read the full text: &lt;a href="https://secdim.com/blog/post/langchain-load-is-basically-eval-17661/" rel="noopener noreferrer"&gt;https://secdim.com/blog/post/langchain-load-is-basically-eval-17661/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>ai</category>
      <category>security</category>
    </item>
    <item>
      <title>Weekly Incident - Exploitation Challenges</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Thu, 05 Mar 2026 01:53:11 +0000</pubDate>
      <link>https://forem.com/secdim/weekly-incident-exploitation-challenges-1d0k</link>
      <guid>https://forem.com/secdim/weekly-incident-exploitation-challenges-1d0k</guid>
      <description>&lt;p&gt;Some of our new Exploitation challenges are now free for a limited time in the Weekly Incident Game.&lt;/p&gt;

&lt;p&gt;If you want a hands-on taste of breaking vulnerable apps and contracts, this is your window.&lt;/p&gt;

&lt;p&gt;👉 Go try it now: &lt;a href="https://play.secdim.com/game/weekly-incident" rel="noopener noreferrer"&gt;https://play.secdim.com/game/weekly-incident&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>security</category>
      <category>programming</category>
      <category>web3</category>
    </item>
    <item>
      <title>New Challenge Category: Exploitation</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Wed, 04 Mar 2026 03:20:22 +0000</pubDate>
      <link>https://forem.com/secdim/new-challenge-category-exploitation-33n8</link>
      <guid>https://forem.com/secdim/new-challenge-category-exploitation-33n8</guid>
      <description>&lt;p&gt;We’ve just launched a brand-new category on SecDim: &lt;a href="https://play.secdim.com/game/exploitation" rel="noopener noreferrer"&gt;Exploitation&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;These are hands-on hackme challenges.&lt;br&gt;
Your objective isn’t to patch vulnerabilities, it’s to find and exploit them.&lt;/p&gt;

&lt;p&gt;From vulnerable JavaScript web apps to insecure smart contracts, this category flips the perspective. You step into the attacker’s role, analyze the application, identify weaknesses, and execute a working exploit.&lt;/p&gt;

&lt;p&gt;This is where theory meets offensive execution.&lt;/p&gt;

&lt;p&gt;If you want to sharpen your vulnerability discovery and real-world exploitation skills, the &lt;a href="https://play.secdim.com/game/exploitation" rel="noopener noreferrer"&gt;Exploitation Game&lt;/a&gt; is now live.&lt;/p&gt;

&lt;p&gt;Go break things (responsibly) 🥷&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://play.secdim.com/game/exploitation/challenge/hackme-justiceweb" rel="noopener noreferrer"&gt;Justice.web&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://play.secdim.com/game/exploitation/challenge/hackme-delegate-callsol" rel="noopener noreferrer"&gt;Delegate Call.sol&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://play.secdim.com/game/exploitation/challenge/hackme-passwordweb" rel="noopener noreferrer"&gt;Password.web&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://play.secdim.com/game/exploitation/challenge/hackme-txoriginsol" rel="noopener noreferrer"&gt;tx.origin.sol&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://play.secdim.com/game/exploitation/challenge/hackme-reentrancysol" rel="noopener noreferrer"&gt;Reentrancy.sol&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>security</category>
      <category>javascript</category>
    </item>
    <item>
      <title>Secure Code Learning for Devs</title>
      <dc:creator>Hamza</dc:creator>
      <pubDate>Thu, 26 Feb 2026 03:23:08 +0000</pubDate>
      <link>https://forem.com/secdim/secure-code-learning-for-devs-5b6m</link>
      <guid>https://forem.com/secdim/secure-code-learning-for-devs-5b6m</guid>
      <description>&lt;p&gt;Most security training wasn’t built for developers.&lt;/p&gt;

&lt;p&gt;It’s compliance-heavy. Slide-driven. Detached from how we actually ship code.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SecDim is different.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SecDim is a developer-first security wargame platform where you practice finding, exploiting, and fixing real vulnerabilities inside actual codebases using workflows that look like your day job.&lt;/p&gt;




&lt;h2&gt;
  
  
  Developer Security Wargames
&lt;/h2&gt;

&lt;p&gt;Not checkbox-first. Developer-first.&lt;/p&gt;

&lt;p&gt;On SecDim, you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Review vulnerable code&lt;/li&gt;
&lt;li&gt;Observe exploitation of said vuln in applications&lt;/li&gt;
&lt;li&gt;Patch vulnerabilities directly in code&lt;/li&gt;
&lt;li&gt;Work in git-based environments&lt;/li&gt;
&lt;li&gt;Think like both the attacker &lt;em&gt;and&lt;/em&gt; the engineer fixing the issue&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The focus isn’t trivia. It’s applied Secure Coding in practice.&lt;/p&gt;




&lt;h2&gt;
  
  
  Real-World Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;All our secure coding challenges are inspired by real security incidents and modern CVEs.&lt;/p&gt;

&lt;p&gt;You won’t just learn what &lt;strong&gt;SQL injection&lt;/strong&gt; is, you’ll:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify it in a live app&lt;/li&gt;
&lt;li&gt;Exploit it&lt;/li&gt;
&lt;li&gt;Understand impact&lt;/li&gt;
&lt;li&gt;Fix it properly in code&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The same goes for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Authentication flaws&lt;/li&gt;
&lt;li&gt;Deserialization bugs&lt;/li&gt;
&lt;li&gt;Access control issues&lt;/li&gt;
&lt;li&gt;CI/CD misconfigurations&lt;/li&gt;
&lt;li&gt;AI/LLM security pitfalls&lt;/li&gt;
&lt;li&gt;And more&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is security the way developers experience it: in repositories, pipelines, and production systems.&lt;/p&gt;




&lt;h2&gt;
  
  
  Built for AppSec &amp;amp; DevSecOps
&lt;/h2&gt;

&lt;p&gt;SecDim focuses on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Secure coding practices&lt;/li&gt;
&lt;li&gt;Code review security mindset&lt;/li&gt;
&lt;li&gt;Incident-driven learning&lt;/li&gt;
&lt;li&gt;Git-based challenge environments&lt;/li&gt;
&lt;li&gt;Hands-on remediation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you're a backend engineer, DevOps engineer, or AppSec professional, the goal is the same:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Build the muscle memory to ship secure code.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;If you’re a developer who wants practical security skills, SecDim was built for you.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://secdim.com" rel="noopener noreferrer"&gt;https://secdim.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Want to skip to the fun part? Check out our challenge catalogue:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://play.secdim.com" rel="noopener noreferrer"&gt;https://play.secdim.com&lt;/a&gt;&lt;/p&gt;




</description>
      <category>webdev</category>
      <category>programming</category>
      <category>security</category>
      <category>learning</category>
    </item>
  </channel>
</rss>
