1970 exploitable findings later.

https://hackernoon.imgix.net/images/FmTsksb9GKgyE1gsS7okfkihN683-q893bd4.png

Been a while. We were busy hacking. Ethically, of course.

Over the last few months, we’ve been building Kira: an AI security agent that reviews code the way a security researcher does. Not by matching patterns or blindly flagging sinks, but by reasoning about exploitability. What assumptions does the system make? Where do trust boundaries shift? Which components interact in ways nobody modeled? And sometimes more importantly: which findings are technically real, but operationally irrelevant?

We started with benchmarks. Then we pointed Kira at real production systems.

That’s when a pattern became impossible to ignore.

Most security tooling still analyzes software the way applications looked five years ago: isolated files, isolated vulnerabilities, isolated sinks.

But modern vulnerabilities rarely live inside a single component anymore.

They emerge in the seams between otherwise correct systems.

The sanitizer works. The middleware works. The webhook handler works. The ORM works. The auth layer works.

...

Copyright of this story solely belongs to hackernoon.com. To see the full text click HERE

Read more

https://cdn.geekwire.com/wp-content/uploads/2026/05/soma.jpg

S. “Soma” Somasegar, who led Microsoft's Developer Division for 12 years as part of his 27-year tenure at the company before leaving in 2015, has died at age 59

Sponsor Posts Niantic Spatial: World models need real-world data — Scaniverse is the gateway to spatial services — self-serve and built for AI and robotics. Large-area 3D reconstruction from 360° cameras and precise localization, anywhere machines operate. App Spotlight: Quo for Zoho CRM — App Spotlight brings you hand-picked solutions that enhance your