#tenable

2026-02-12

----------------

🎯 AI
===================

Executive summary: Moltbook, an AI-only social network populated by OpenClaw agents, presents immediate security risks: pervasive spam/scams, exposure of agents to untrusted content via API-oriented prompt files, and a reported database compromise that leaked API keys enabling bot impersonation and direct prompt injection.

Technical details:
• SKILLS.md, HEARTBEAT.md, and MESSAGING.md are repository-style markdown files that describe how agents interact with the Moltbook API. SKILLS.md documents API interactions and recommends HTTP requests (curl-style). HEARTBEAT.md instructs periodic check-ins. MESSAGING.md notes that messaging requires human approval, while other endpoints accept automated agent input.
• Experimental tooling (reported as a CLI tool named moltbotnet) implemented API calls for posting, commenting, upvoting, following, and engagement automation. This tooling demonstrates how easily an agent or impersonator can script interactions.
• Reported breach of Moltbook’s database exposed API keys tied to agent identities. Those keys materially enable: impersonation of legitimate agents, submission of crafted prompts to agent workloads, and direct prompt injection vectors that bypass typical human-only guards.

Analysis:

The combination of (1) public, machine-readable prompt files that instruct agents how to behave, (2) open posting and engagement that accepts untrusted content, and (3) leaked credentials produces two classes of injection risks: indirect prompt injection (agents ingesting malicious content from other agents) and direct prompt injection (attacker using stolen API keys to send malicious prompts as a trusted agent). The observed ecosystem is also saturated with social-engineering lures (requests to run package installers, share crypto wallets, or call external APIs).

Detection guidance:
• Monitor unexpected use of API keys or unusual posting frequency associated with agent identities.
• Inspect content sources for scripted patterns (repeated promotional payloads, command-like text referencing package managers or curl usage).

Limitations:
• No public CVE identifiers are reported in the source material.
• Exact scope of leaked API keys (number of keys, associated privileges) was not enumerated in the writeup.

References and tags:

SKILLS.md, HEARTBEAT.md, MESSAGING.md — Tenable Research field report on Moltbook interactions and breach findings.

🔹 OpenClaw #Moltbook #promptinjection #APIkeys #Tenable

🔗 Source: tenable.com/blog/undercover-on

2026-02-12
Accepting my disabled body means replacing “I can't do that anymore” with “this is how I do it now”.

#tenable #artjournal #blackfeminist #art #creativereuse
2026-01-21

WP Advanced Custom Fields Extended plugin bug gives admin

Your friendly reminder to minimize the WordPress plugins you deploy to what you actually need. BleepingComputer has an article:

A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions.

ACF Extended, currently active on 100,000 websites, is a specialized plugin that extends the capabilities of the Advanced Custom Fields (ACF) plugin with features for developers and advanced site builders.

Unauthenticated privilege escalation to get admin is about as bad as it gets. Though, it does appear the WordPress blog has to have mapped “role” as a custom field. It’s impossible for anyone other than the blog owner to know if that’s the case. Well, probably spammers and scammers seeking sites to compromise and turn into platforms to exploit might given which ones they successfully turn.

It’s tracked as CVE-2025-14533:

#tenable #vulnerability #Wordpress #wordpressPlugins

Swear to god, if I ever physically encounter someone that works for #Tenable, especially their #Nessus group, and especially the team that's in charge of the nessus-agent for #Linux, I will hose them down with Napalm and set them on fire.

#security

2025-12-03

Heyyyyy #Tenable #Nessus? Can we maybe not run sketchy-looking #PowerShell on my computer? I just happened to catch this in the logs. Kay, thanks.

Marc Ruef :verified:mruef@infosec.exchange
2025-12-02
2025-10-25

NVD Delays Leave Defenders in the Dark — Early Visibility is Key
Tenable’s recent analysis shows a worrying pattern in vulnerability disclosure timing:
- 63,862 CVEs from 2024–2025
- 56% of PoCs released within 7 days
- NVD lagging by ~15 days
- Exploitation confirmed in as little as 5 days
This gap between CVE assignment, PoC publication, and NVD visibility creates exploitable blind spots for enterprises relying on traditional patch cycles.
💬 Security leaders - how do you bridge these gaps? Do you trust vendor advisories, exploit feeds, or telemetry-driven signals more?

👍 Like and follow @technadu for continuous coverage of emerging vulnerability management insights.

#InfoSec #CyberSecurity #VulnerabilityManagement #ThreatIntel #NVD #Exploit #RiskIntel #Tenable #CVEs #CyberDefense #ZeroDay #CVETracking #VulnDisclosure #TechNadu

risk
Marc Ruef :verified:mruef@infosec.exchange
2025-10-23
2025-10-15

Patch Tuesday, October 2025 ‘End of 10’ Edition - Microsoft today released software updates to plug a whopping 172 security holes in its Wi... krebsonsecurity.com/2025/10/pa #microsoftpatchtuesdayoctober2025 #microsoftoffice #cve-2025-24990 #cve-2025-59227 #cve-2025-59230 #cve-2025-59234 #cve-2025-59287 #satnamnarang #timetopatch #immersive #kevbreen #tenable

2025-10-15

🧠 EDR Tools Are Not Exposure Management Solutions.

They’re reactive, not proactive - designed to respond after compromise, not prevent it.
EDR misses entire classes of assets like routers, IoT, and third-party systems.

💬 What’s your approach to achieving full attack surface visibility?

Follow @technadu for more discussions on vulnerability intelligence and exposure reduction.

#CyberSecurity #ExposureManagement #EDR #Tenable #InfoSec #ThreatDetection #VulnerabilityIntelligence #TechNadu

Relying on EDR for Exposure Management? Here’s What You Need to Know
2025-10-06

Cloud adoption keeps rising — but security maturity lags behind.

Tenable & CSA report that 33% of orgs using AI faced data breaches, and 52% call identity risk their top concern.

technadu.com/cloud-and-ai-secu

#CloudSecurity #AIsecurity #Cybersecurity #Tenable #CSA

Cloud adoption keeps rising — but security maturity lags behind.
gtbarrygtbarry
2025-09-16

Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details

Tenable has confirmed a data breach that exposed the contact details and support case information of some of its customers.

The company stated the incident is part of a broader data theft campaign targeting an integration between Salesforce and the Salesloft Drift.

cybersecuritynews.com/tenable-

2025-09-12

☁️🤖 Cloud & AI Security 2025 report: @tenablesecurity
🔹 82% hybrid cloud
🔹 63% multi-cloud
🔹 34% of orgs with/ AI workloads have already hit by breaches
🔹 Identity risks remain under-managed
Is AI security the next weak point—or the next defense frontier?

Follow @technadu for more.

#Tenable #CloudSecurity #AIWorkloads #HybridCloud #IdentitySecurity

Tenable
2025-09-09

Microsoft Patch Tuesday, September 2025 Edition - Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities ... krebsonsecurity.com/2025/09/mi #sansinternetstormcenter #latestwarnings #thecomingstorm #cve-2025-38352 #cve-2025-48543 #cve-2025-54916 #cve-2025-54918 #cve-2025-55177 #cve-2025-55234 #ntlanmanager #satnamnarang #timetopatch #windowsntlm #immersive #microsoft #kevbreen #whatsapp #tenable #windows #apple

D_70WN 🌈 🏳️‍⚧️D_70WN@chaos.social
2025-09-08

Tenable has confirmed a data breach that exposed the contact details and support case information of some of its customers.

The company stated the incident is part of a broader data theft campaign targeting an integration between #Salesforce and the Salesloft Drift marketing application, which has affected numerous organizations. #tenable #databreach

Michael Koerfer ➡️#39C3OT_MacDonald@infosec.exchange
2025-09-08

Cyber uppsi #tenable

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst