Skip to content
View Aviral2642's full-sized avatar

Block or report Aviral2642

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Aviral2642/README.md

πŸ‘Ύ Aviral Srivastava β€” Offensive AI Researcher | Application Security Engineer | CVE Hunter

Cyberpunk Header

Typing SVG


πŸ… RSA Security Scholar 2025

Selected as a 2025 RSA Security Scholar, representing the intersection of AI security, vulnerability research, and offensive red teaming at one of the world's premier security conferences.


🎯 Status Console

Status Access Level Location Mode


🧩 Expertise

  • πŸ” AI/ML Infrastructure Security β€” agentic workflow exploitation, RAG hardening, prompt injection, MCP attack surface, model file deserialization, GPU memory corruption
  • πŸ› οΈ Offensive Security β€” adversary emulation, red teaming, fuzzing, symbolic execution, n-day exploit development, kernel research
  • πŸ€– Adversarial ML β€” jailbreaking, attention-head attacks, safety alignment failures, predictive multiplicity (Rashomon attacks)
  • 🧠 Cryptography β€” LLM-driven CTF generation, JWE/JWT bypasses, authenticated encryption pitfalls
  • ☁️ Cloud Security & DevSecOps β€” application security reviews, threat modeling, secure SDLC
  • πŸ“œ Standards & Governance β€” NIST OLIR, OWASP, ISO/IEC 42001

πŸ›‘οΈ CVE Portfolio & Vulnerability Research

Original vulnerability research across the AI/ML stack: orchestration, agents, inference engines, tokenizers, model serializers, and security tooling itself.

πŸ”₯ Confirmed CVEs

CVE Target Class Severity Notes
CVE-2026-33017 Langflow Unauthenticated RCE Critical 9.3 🚨 CISA KEV · Exploited in the wild within 20 hours of disclosure · Federal remediation deadline · GHSA-vwmf-pq79-vjvx
CVE-2026-32628 AnythingLLM SQL Injection (Built-in SQL Agent) High GHSA-jwjx-mw2p-5wc7 Β· CWE-89 in agentic tool-call surface

🟣 Independent Bug Reports β€” No CVE, Disclosed Publicly

Valid, technically inarguable findings where the vendor declined to assign a CVE (often through a retroactive documentation shield) but where the underlying issue is real, reproducible, and publicly disclosed.

Target Finding Severity Status
XGBoost (Γ—5) Heap OOB in tree node access Β· UBJSON parser memory corruption Β· Parallel tree double-free Β· Unsafe pickle.loads() on network data (CWE-502) Β· Hardcoded 0xff99 magic number as Rabit tracker auth (CWE-798) Critical / High Vendor declined ("performance + resourcing"). Full technical writeup published on Medium and LinkedIn.
Google sentencepiece Off-by-4 bounds check in DecodePrecompiledCharsMap enabling OOB read via crafted .model files (UBSan-confirmed) Medium Google VRP Report #498463886 Β· sentencepiece is the tokenizer backbone of Gemma, T5, and PaLM
Google sentencepiece Unvalidated trie values used as piece array indices (heap OOB read, release builds) High Google VRP Report #498465599 Β· Upstream fix landed via PR #1207
vLLM LoRA adapter SSRF β†’ RCE chain High Closed via documentation shield. Public writeup.

πŸ“œ Standards Body Contributions

Body Contribution Detail
NIST OLIR Catalog Mapping (Live) First AI security framework mapping in the NIST Online Informative References catalog: OWASP LLM Top 10 v2.0 β†’ NIST CSF 2.0, 169 relationship entries covering 77 of 106 CSF subcategories. Listed Point of Contact on the NIST CSRC website.

🎀 Invited Talks

Full speaker profile: sessionize.com/aviral-srivastava

Conference Year Talk
RSAC 2026 2026 From Prompt to Pager: Preparing for AI-Native Incidents Now
ISACA North America 2026 2026 Breaking the Loop: Offensive Testing of RL and Agentic AI Systems
CactusCon 14 2025 Agents Under Siege: Live Attacks from RAG to Tool Calls
CypherCon 2025 2025 Deceiving the Deceivers: Offensive Security Strategies for Adversarial AI Attacks
BSidesSLC 2025 2025 Filling Gaps in AI Governance: How ISO/IEC 42001 Shapes the Future of AI Risk and Compliance
BSidesTC 2025 2025 ROP Alchemy: Universal Gadgets via Type Confusion
CactusCon 13 2025 Weaponizing AI: Adversarial Attacks, Hallucinations, and the Offensive Security Frontier
HOPE XV 2024 Invited Talk (details under NDA)
BSidesChicago 2024 2024 Hacking Neural Networks: The Hidden Vulnerabilities of AI Systems

πŸ“° Media Coverage

Coverage of CVE-2026-33017 across major cybersecurity publications. Quoted by name as the discoverer in The Hacker News, Help Net Security, Barrack AI, and Cloud Security Alliance research notes.

  • The Hacker News β€” Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
  • Help Net Security β€” CISA sounds alarm on Langflow RCE after rapid exploitation
  • Infosecurity Magazine β€” Hackers Exploit Critical Langflow Bug in Just 20 Hours
  • Sysdig Threat Research β€” CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours
  • Cloud Security Alliance β€” Research Notes (Γ—2) on the Langflow RCE
  • Qualys ThreatProtect β€” CISA Added Langflow Vulnerability to KEV Catalog
  • Barrack AI β€” Langflow Got Hacked Twice Through the Same exec() Call
  • InfoSec Today β€” Critical Langflow Flaw Triggers Attacks within 20 Hours
  • HackerNoon β€” CVE-2026-33017: Unauthenticated RCE in Langflow's Public Flow Endpoint Explained
  • CiberSafety β€” CVE-2026-33017 in Langflow: Critical vulnerability for RCE without authentication

πŸš€ Projects & Tools

  • 🎯 ZeroDayForge β€” Full-spectrum adversary emulation and exploit automation framework
  • 🧨 Autonomous n-day Linux Kernel Exploit Pipeline β€” Mac M1 toolchain (radare2, lldb, Ghidra headless) running RECON β†’ AUTO-PICK β†’ 12-POINT SAFETY GATE β†’ PATCH ANALYSIS β†’ ROOT CAUSE β†’ EXPLOIT STRATEGY β†’ COMPILE VERIFY, producing Exploit-DB-format exploit.c artifacts
  • πŸ›‘οΈ Multi-Agent CVE Hunting Pipeline β€” Claude Code agent team (Recon Β· Auditor Β· Exploiter Β· Reporter) governed by a 14-rule submission framework and a 4-gate filter (unauthenticated Β· default config Β· no doc shield Β· core feature)
  • πŸ§ͺ LLM-Driven Cryptographic CTF Generator β€” Automated cryptographic challenge generation system (MS Thesis, Penn State)

πŸ’Ό Experience

  • πŸ” Security Engineer (L4) β€” Amazon Ads Security, Sunnyvale, CA (2025 – Present) AppSec reviews, threat modeling, penetration testing, AI/ML security, agentic workflows, prompt injection, RAG hardening
  • πŸ§ͺ Security Internships (6Γ—) β€” Malware reverse engineering, secure DevOps, GRC
  • πŸ§‘β€πŸ« Teaching Assistant β€” Red Teaming, CTFs, Penn State β€” Led offensive security labs and workshops

πŸŽ“ Education

  • πŸŽ“ MS in Cybersecurity Analytics & Operations β€” The Pennsylvania State University GPA: 4.0 Β· Research Assistant Β· RSA Security Scholar Thesis: AI-Generated Cryptographic CTF Challenges
  • πŸŽ“ BTech in Computer Science β€” Amity University Focus: Cryptography, Secure Systems, Network Security

πŸ† Awards & Recognition

  • πŸ₯‡ RSA Security Scholar 2025
  • πŸ… Cybersecurity Innovator of the Year β€” BSides Bangalore 2023
  • πŸ“œ ISSN Best International Research Award
  • 🌟 Young Researcher Award
  • πŸŽ™οΈ Speaker: RSAC, ISACA North America, HOPE XV, CypherCon, CactusCon (Γ—2), BSides (Γ—3)
  • 🌍 HackTheBox PRO HACKER β€” Top 200 Global Β· πŸ‡ΊπŸ‡Έ Rank #24 HTB Badge Β· HTB Profile

🌐 Connect


πŸ“Š GitHub Stats


πŸ’¬ "The more they secure, the more we exploit. The future belongs to offensive AI."

Footer

Popular repositories Loading

  1. kernelghost kernelghost Public

    KernelGhost is a next-generation offensive security framework that combines stealthy eBPF-based rootkit capabilities with advanced hypervisor escape techniques. It enables persistent cross-VM acces…

    C 25 3

  2. AdversaryPilot AdversaryPilot Public

    ATLAS-aligned Bayesian attack planning & orchestration engine for LLM, agent, and ML systems

    Python 7 2

  3. AI-Attack-Mind-Map-Comprehensive-AI-Security-Threats-Attack-Vectors AI-Attack-Mind-Map-Comprehensive-AI-Security-Threats-Attack-Vectors Public

    The world’s most detailed AI Attack Mind Map covering LLMs, RAG, Agentic AI, RL, diffusion, MLOps, federated learning, and hardware side-channels.

    5 1

  4. Polymorphic-Shellcode-Engine Polymorphic-Shellcode-Engine Public

    A next-generation engine for generating metamorphic shellcode payloads with built-in evasion capabilities, designed for red team operations and penetration testing.

    Python 4

  5. vllm-integer-truncation-audit vllm-integer-truncation-audit Public

    Security audit documenting 221 silent int64-to-int32 truncation sites in vLLM's CUDA/C++ extensions that enable GPU buffer overflow via crafted GGUF model files.

    4

  6. adversary-emulation-framework adversary-emulation-framework Public

    A fully functional Adversary Emulation Framework built to simulate real-world threat actor behavior using MITRE ATT&CK techniques. Supports both real-mode execution and testing, allowing security p…

    Python 1