Skip to content

SnailSploit/SnailSploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

SnailSploit Banner

SnailSploit

GenAI Security Researcher · AI Red Teamer · Offensive Security Writer

Website The Jailbreak Chef LinkedIn


I'm Kai Aizen — independent security researcher focused on adversarial AI, LLM red teaming, and the intersection of social engineering and prompt injection. I build frameworks and tooling for structured AI safety testing.

Creator of AATMF · Author of Adversarial Minds · 22 CVEs · Linux kernel contributor · Hakin9 Contributing Author


🛡️ CVEs — 22 Published

🟣 Critical Severity

# CVE Target Type CVSS
1 CVE-2026-3596 Riaxe Product Customizer (WP) Missing Authorization → Unauthenticated Arbitrary Options Update → Privilege Escalation via install-imprint AJAX action 9.8

🔴 High Severity

# CVE Target Type CVSS
2 CVE-2026-3288 Kubernetes ingress-nginx Config Injection → RCE 8.8
3 CVE-2026-1313 MimeTypes Link Icons (WP) SSRF via crafted post content 8.3
4 CVE-2026-30911 Apache Airflow Core Missing Authorization — HITL Endpoints (v3.1.0–3.1.7) 8.1
5 CVE-2026-31899 CairoSVG Exponential DoS — recursive <use> amplification 7.5
6 CVE-2026-3599 Riaxe Product Customizer (WP) Unauthenticated SQL Injection via options parameter keys in product-data 7.5
7 CVE-2026-32809 ouch-org/ouch Symlink escape → arbitrary file overwrite 7.4
8 (pending) TelSender (WP) Unauthenticated Stored XSS via Telegram Chat Title 7.2

🟡 Medium Severity

# CVE Target Type CVSS
9 CVE-2025-9776 CatFolders (WP) SQL Injection via CSV Import 6.5
10 CVE-2026-33693 Lemmy / activitypub-federation-rust SSRF — 0.0.0.0 bypass 6.5
11 CVE-2026-32885 ddev/ddev ZipSlip path traversal in archive extraction 6.5
12 CVE-2025-12163 Omnipress (WP) Stored XSS 6.4
13 CVE-2026-0811 Advanced CF7 DB (WP) CSRF → Form Entry Deletion 5.4
14 CVE-2026-1314 3D FlipBook (WP) Missing Auth → Data Exposure 5.3
15 CVE-2026-3594 Riaxe Product Customizer (WP) Unauthenticated Info Disclosure via /orders 5.3
16 CVE-2026-3595 Riaxe Product Customizer (WP) Unauthenticated Arbitrary User Deletion via user_id parameter 5.3
17 CVE-2025-11171 Chartify (WP) Missing Authentication for Admin Function 5.3
18 CVE-2025-11174 Document Library Lite (WP) Missing Auth → Info Disclosure 5.3
19 CVE-2026-32794 Apache Airflow Databricks Provider TLS Certificate Verification Bypass → MitM 4.8
20 CVE-2026-0814 Advanced CF7 DB (WP) Missing Auth → Subscriber+ Export 4.3
21 CVE-2025-12030 ACF to REST API (WP) IDOR → Contributor+ Field Modification 4.3
22 CVE-2026-1208 Welcart (WP) CSRF → Settings Update 4.3

🔓 Security Advisories (GHSAs)

Advisory Target Type Severity
GHSA-j425-whc4-4jgc OpenClaw (309k ⭐) system.run env override RCE — allowlist bypass via GIT_SSH_COMMAND, editor hooks, GIT_CONFIG_* Medium (6.3)
GHSA-9jmq-9m65-3fhx dagster-io/dagster Arbitrary code exec via pickle deserialization in IO managers + Databricks
GHSA-pph4-qh43-9qm6 vllm-project/vllm RCE via unauthenticated TCPStore Pickle deserialization (V1 Engine)
GHSA-gwmc-ch8w-qhx5 vllm-project/vllm RCE via TCPStore Pickle deserialization (StatelessProcessGroup)
GHSA-c64x-w74w-4h53 FlowiseAI/Flowise Unauthenticated code exec via prediction API auth whitelist bypass
GHSA-9vqm-j6v3-2xr4 juspay/hyperswitch SSRF via merchant webhook URL
GHSA-f38f-5xpm-9r7c CairoSVG Exponential DoS — recursive <use> element amplification High (7.5)

🐧 Kernel Research

Finding Component Type Status
io_uring/zcrx Race Condition Linux kernel io_uring/zcrx Race Condition → Double-Free → OOB Write Upstream, backported to v6.18.16 + v6.19

🔧 Merged Security Fixes

PR Target Type Status
concourse/concourse#9486 Concourse CI Symlink breakout — unvalidated symlink targets in tar extraction ✅ Merged, shipped in v8.1.1

🔴 Frameworks & Tooling

Project Description
AATMF v3.1 Adversarial AI Threat Modeling Framework — 20 tactics, ~240 techniques. Maps to OWASP LLM Top-10, NIST AI RMF, MITRE ATLAS. AATMF
AATMF Red Teaming Toolkit Python CLI for systematic LLM safety testing — three-layer eval pipeline, defense fingerprinting, decay tracking, attack chain planning. NEW
LLM Red Teamer's Playbook Diagnostic methodology for bypassing LLM defense layers — input filters → alignment → identity → output → agentic trust.

🧪 Experiments & PoCs

Project Description
ChatGPT-DNS-Exfill DNS exfiltration via ChatGPT Canvas — rendered content triggers DNS lookups without HTTP requests.
chatgpt-rce-dns DNS exfiltration and Python Pickle RCE attack chains in AI code execution sandboxes.

🛠️ Offensive Tools

Tool Description
Burp MCP Toolkit MCP security analysis for Burp Suite — prompt injection and tool poisoning testing via Model Context Protocol.
SnailHunter AI-powered bug bounty automation — LLM analysis combined with traditional security scanning.
KubeRoast Red-team Kubernetes misconfiguration and attack-path scanner.
Xposure Autonomous credential intelligence platform for attack surface recon.
SnailSploit Recon Chrome MV3 extension for passive recon and bug bounty automation.
ZenFlood Low-bandwidth stress testing — modernized Slowloris.
Claude-Red Curated offensive security skills library for the Claude skills system.
SnailObfuscator Structurally-aware code obfuscation engine.

SnailSploit

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors