Download our Latest Industry Report – Continuous Offensive Security Outlook 2026

A Possible Solution to the Zodiac Killer Z32 Cipher

Introduction The Zodiac Killer, one of America’s most notorious unsolved serial killer cases, sent numerous encrypted messages to newspapers during his reign of terror in the late 1960s and early 1970s. While his 408-character cipher was eventually cracked, the shorter “Z32” cipher that accompanied a map of the San Francisco Bay Area has remained unsolved […]

Introducing Augustus: Open Source LLM Prompt Injection Tool

Augustus open-source LLM vulnerability scanner dashboard showing automated prompt injection, jailbreak, and adversarial attack testing across 28 LLM providers.

From LLM Fingerprinting to LLM Prompt Injection Last month we released Julius, a tool that answers the question: “what LLM service is running on this endpoint?” Julius identifies the infrastructure. But identification is only the first step. The natural follow-up: “now that I know what’s running, how do I test whether it’s secure?” That’s what […]

Deterministic AI Orchestration: A Platform Architecture for Autonomous Development

Architecture diagram of a deterministic AI orchestration platform showing the "thin agent" pattern, autonomous development workflows, and lifecycle hooks for LLM enforcement.

Executive Summary The primary bottleneck in autonomous software development is not model intelligence, but context management and architectural determinism. Current “Agentic” approaches fail at scale because they rely on probabilistic guidance (prompts) for deterministic engineering tasks (builds, security, state management). Furthermore, the linear cost of token consumption versus the non-linear degradation of model attention creates a “Context Trap” […]

Critical Advisory: Remote Code Execution in Next.js (CVE-2025-66478) with Working Exploit

Critical Advisory - React Next.js RCE

Date: December 4, 2025Severity: Critical (CVSS 10.0)Components: Next.js App Router & React Server Components We are alerting all customers to a critical Remote Code Execution (RCE) vulnerability affecting Next.js applications using the App Router. This vulnerability, tracked as CVE-2025-66478, stems from an upstream issue in the React Server Components (RSC) protocol (CVE-2025-55182). React provided a […]