<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Home on Jashid Sany</title>
    <link>https://jashidsany.com/</link>
    <description>Recent content in Home on Jashid Sany</description>
    <image>
      <title>Jashid Sany</title>
      <url>https://jashidsany.com/images/og-default.png</url>
      <link>https://jashidsany.com/images/og-default.png</link>
    </image>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 23 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://jashidsany.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>mcp-recon: A Reconnaissance Scanner for MCP Servers</title>
      <link>https://jashidsany.com/tools/mcp-recon/</link>
      <pubDate>Thu, 23 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/tools/mcp-recon/</guid>
      <description>An open-source CLI that fingerprints Model Context Protocol servers and flags behavior patterns associated with publicly disclosed vulnerability classes. Think nmap for MCP.</description>
    </item>
    <item>
      <title>CVE-Dedup-Checker: Parallel Duplicate Checks Across Free Vulnerability Databases</title>
      <link>https://jashidsany.com/tools/cve-dedup-checker/</link>
      <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/tools/cve-dedup-checker/</guid>
      <description>An open-source CLI that queries NVD, OSV, GitHub Advisories, WPScan, Patchstack, CISA KEV, and Exploit-DB in parallel so you can check for duplicate findings before submitting a CVE.</description>
    </item>
    <item>
      <title>Zomato MCP: OAuth Scope Parameter Silently Rewritten, Not Enforced</title>
      <link>https://jashidsany.com/security-research/ai-security/zomato-mcp-oauth-scope-not-enforced/</link>
      <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/zomato-mcp-oauth-scope-not-enforced/</guid>
      <description>The OAuth server fronting Zomato&amp;#39;s MCP endpoint rewrites the scope request and issues tokens labeled &amp;#39;offline openid&amp;#39; that nonetheless call every MCP tool, including checkout_cart. The advertised mcp:tools / mcp:resources / mcp:prompts scopes are never enforced at the application layer.</description>
    </item>
    <item>
      <title>Claude Code Finding 5: Permission Deny Bypass via Script Write and Execute</title>
      <link>https://jashidsany.com/security-research/ai-security/claude-code-finding-5-deny-bypass-script-exec/</link>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/claude-code-finding-5-deny-bypass-script-exec/</guid>
      <description>Claude Code&amp;#39;s Bash permission deny rules can be completely bypassed by writing denied commands into a script file and executing it. The parser evaluates only the script path, not its contents. Five explicitly denied commands executed and exfiltrated data to an external endpoint.</description>
    </item>
    <item>
      <title>Windsurf Finding 1: Overly Permissive IDE Agent Bypasses Auto Execution Controls</title>
      <link>https://jashidsany.com/security-research/ai-security/windsurf-finding-1-overly-permissive-agent/</link>
      <pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/windsurf-finding-1-overly-permissive-agent/</guid>
      <description>Windsurf&amp;rsquo;s Cascade agent reads and writes files outside the workspace with zero confirmation, even with Auto Execution set to Disabled. The review prompt on writes is cosmetic: files exist on disk before the user can reject.</description>
    </item>
    <item>
      <title>Windsurf Finding 2: Indirect Prompt Injection and Credential Exfiltration via GitHub Gists</title>
      <link>https://jashidsany.com/security-research/ai-security/windsurf-finding-2-indirect-prompt-injection/</link>
      <pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/windsurf-finding-2-indirect-prompt-injection/</guid>
      <description>How a hidden HTML comment in a GitHub Gist caused Windsurf&amp;rsquo;s Cascade agent to read SSH keys and AWS credentials, then exfiltrate them to an attacker-controlled endpoint with zero user interaction.</description>
    </item>
    <item>
      <title>Enterprise Risk Assessment: Claude Desktop and Cowork Security</title>
      <link>https://jashidsany.com/security-research/papers/enterprise-risk-assessment-claude-desktop-cowork/</link>
      <pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/papers/enterprise-risk-assessment-claude-desktop-cowork/</guid>
      <description>Comprehensive security risk assessment for organizations deploying Claude Desktop and Cowork in regulated environments, covering publicly disclosed vulnerabilities and independent research findings.</description>
    </item>
    <item>
      <title>Research Paper: Trust Boundary Failures in AI Coding Agents</title>
      <link>https://jashidsany.com/security-research/papers/research-paper-trust-boundary-failures/</link>
      <pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/papers/research-paper-trust-boundary-failures/</guid>
      <description>Empirical analysis of MCP configuration attacks in Claude Code with enterprise defensive architecture recommendations.</description>
    </item>
    <item>
      <title>Claude Code Finding 1: Silent Command Execution via .mcp.json Trust Model</title>
      <link>https://jashidsany.com/security-research/ai-security/claude-code-finding-1-mcp-rce/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/claude-code-finding-1-mcp-rce/</guid>
      <description>How a one-time trust decision in Claude Code enables silent arbitrary command execution when .mcp.json is modified after initial approval.</description>
    </item>
    <item>
      <title>Claude Code Finding 2: MCP Blanket Trust Escalation via enableAllProjectMcpServers</title>
      <link>https://jashidsany.com/security-research/ai-security/claude-code-finding-2-mcp-trust-escalation/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/claude-code-finding-2-mcp-trust-escalation/</guid>
      <description>How the &amp;#39;Use this and all future MCP servers&amp;#39; option grants permanent, unbounded trust to arbitrary MCP server definitions added after the initial consent.</description>
    </item>
    <item>
      <title>Claude Code Finding 3: MCP Tool Confirmation Prompt Misrepresentation Enables Arbitrary Code Execution</title>
      <link>https://jashidsany.com/security-research/ai-security/claude-code-finding-3-mcp-prompt-mismatch/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/claude-code-finding-3-mcp-prompt-mismatch/</guid>
      <description>A malicious MCP server can misrepresent tool actions in Claude Code&amp;#39;s confirmation prompt, causing users to approve a file read while the server silently executes system commands.</description>
    </item>
    <item>
      <title>Claude Code Finding 4: Remote Control Session Hijacking via Missing Per-Session Authentication</title>
      <link>https://jashidsany.com/security-research/ai-security/claude-code-finding-4-session-hijack/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/ai-security/claude-code-finding-4-session-hijack/</guid>
      <description>The Claude Code remote-control session events endpoint lacks per-session authentication, enabling invisible remote command execution from any machine on the internet.</description>
    </item>
    <item>
      <title>Remote Code Execution in docker-wkhtmltopdf-aas: Command Injection via Unsanitized Options</title>
      <link>https://jashidsany.com/security-research/exploit-dev/wkhtmltopdf-aas-rce/</link>
      <pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/exploit-dev/wkhtmltopdf-aas-rce/</guid>
      <description>How I found a critical command injection vulnerability in docker-wkhtmltopdf-aas, a Dockerized HTML-to-PDF web service, and achieved remote code execution as root through unsanitized user options passed to a shell command.</description>
    </item>
    <item>
      <title>Finding an RCE in iOS-remote: OS Command Injection via Flask</title>
      <link>https://jashidsany.com/security-research/exploit-dev/ios-remote-rce/</link>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/exploit-dev/ios-remote-rce/</guid>
      <description>How I found an OS command injection vulnerability in iOS-remote, a Flask-based iOS device management tool, and achieved remote code execution through an unsanitized subprocess call.</description>
    </item>
    <item>
      <title>My First CVE: DLL Hijacking in CactusViewer v2.3.0</title>
      <link>https://jashidsany.com/security-research/malware-dev/dll-hijacking-cactusviewer/</link>
      <pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/malware-dev/dll-hijacking-cactusviewer/</guid>
      <description>How I discovered a DLL hijacking vulnerability in CactusViewer v2.3.0, built a proof of concept, and submitted it for a CVE ID.</description>
    </item>
    <item>
      <title>Stego-Drop: Hiding Shellcode in PNG Images with LSB Steganography</title>
      <link>https://jashidsany.com/tools/stego-drop/</link>
      <pubDate>Tue, 24 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/tools/stego-drop/</guid>
      <description>A walkthrough of building stego-drop, a Python LSB steganography tool for embedding shellcode and binary payloads into PNG images.</description>
    </item>
    <item>
      <title>Linux-Enum: Linux Auto-Enumerator</title>
      <link>https://jashidsany.com/tools/linux-enum/</link>
      <pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/tools/linux-enum/</guid>
      <description>A Python tool to automate Linux enumeration for penetration testing and OSCP preparation.</description>
    </item>
    <item>
      <title>Win-Enum: Windows &amp; Active Directory Auto-Enumerator</title>
      <link>https://jashidsany.com/tools/win-enum/</link>
      <pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/tools/win-enum/</guid>
      <description>A Python tool to automate Windows and Active Directory enumeration for penetration testing and OSCP preparation.</description>
    </item>
    <item>
      <title>HackTheBox: Bashed - Web Shell Discovery &amp; Cron Privilege Escalation</title>
      <link>https://jashidsany.com/hackthebox/bashed/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/hackthebox/bashed/</guid>
      <description>Walkthrough of HackTheBox Bashed, finding an exposed phpbash web shell and escalating to root via a Python cron job.</description>
    </item>
    <item>
      <title>HackTheBox: Devel - FTP Upload to IIS &amp; Kernel Exploit Privesc</title>
      <link>https://jashidsany.com/hackthebox/devel/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/hackthebox/devel/</guid>
      <description>Walkthrough of HackTheBox Devel, uploading a web shell via anonymous FTP to an IIS server and escalating to SYSTEM using MS11-046 kernel exploit.</description>
    </item>
    <item>
      <title>HackTheBox: Forest - AS-REP Roasting &amp; DCSync Attack</title>
      <link>https://jashidsany.com/hackthebox/forest/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/hackthebox/forest/</guid>
      <description>Walkthrough of HackTheBox Forest, exploiting Active Directory misconfigurations through AS-REP Roasting, Account Operators abuse, and DCSync attack to gain Domain Admin.</description>
    </item>
    <item>
      <title>HackTheBox: Optimum - HFS RCE &amp; Kernel Exploit Privesc</title>
      <link>https://jashidsany.com/hackthebox/optimum/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/hackthebox/optimum/</guid>
      <description>Walkthrough of HackTheBox Optimum, exploiting HttpFileServer 2.3 RCE vulnerability and escalating to SYSTEM using MS16-098 kernel exploit.</description>
    </item>
    <item>
      <title>HackTheBox: Shocker - Shellshock Exploitation &amp; Perl Sudo Privesc</title>
      <link>https://jashidsany.com/hackthebox/shocker/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/hackthebox/shocker/</guid>
      <description>Walkthrough of HackTheBox Shocker, exploiting the Shellshock vulnerability (CVE-2014-6271) in a CGI script and escalating to root via sudo perl.</description>
    </item>
    <item>
      <title>HackTheBox: Blue - EternalBlue (MS17-010) Exploitation</title>
      <link>https://jashidsany.com/hackthebox/htb-blue/</link>
      <pubDate>Fri, 20 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/hackthebox/htb-blue/</guid>
      <description>Walkthrough of the HackTheBox Blue machine...</description>
    </item>
    <item>
      <title>Building a PE Parser in C</title>
      <link>https://jashidsany.com/security-research/malware-dev/pe-parser/</link>
      <pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/security-research/malware-dev/pe-parser/</guid>
      <description>A deep dive into Windows PE file structure...</description>
    </item>
    <item>
      <title>About</title>
      <link>https://jashidsany.com/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://jashidsany.com/about/</guid>
      <description>&lt;section class=&#34;about-hero&#34;&gt;
  &lt;img src=&#34;https://jashidsany.com/images/profile.jpg&#34; alt=&#34;Jashid Sany&#34; class=&#34;about-avatar&#34; width=&#34;120&#34; height=&#34;120&#34;&gt;
  &lt;div class=&#34;about-hero-text&#34;&gt;
    &lt;div class=&#34;about-eyebrow&#34;&gt;SECURITY RESEARCHER · RED TEAM&lt;/div&gt;
    &lt;h1 class=&#34;about-name&#34;&gt;Jashid Sany&lt;/h1&gt;
    &lt;p class=&#34;about-positioning&#34;&gt;
      Security researcher and red teamer. I work at the intersection of Windows internals,
      malware development, and the emerging attack surface of AI coding tools.
    &lt;/p&gt;
    &lt;div class=&#34;about-tags&#34;&gt;
      &lt;span class=&#34;role-tag&#34;&gt;Security Researcher&lt;/span&gt;
      &lt;span class=&#34;role-tag&#34;&gt;Red Teamer&lt;/span&gt;
      &lt;span class=&#34;role-tag&#34;&gt;Malware Developer&lt;/span&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;
&lt;p&gt;I build offensive tooling and publish original security research. My work covers the full stack: low-level PE parsing and DLL hijacking in C, command injection RCEs in production web services, and the trust boundary failures and prompt injection primitives that show up in agentic developer tools like Claude Code and Windsurf.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
