nefariousplan.com

I write about systems that fail in interesting ways — vulnerability classes, broken trust models, cryptographic assumptions that turned out to be wrong, and occasionally the institutional dynamics that keep bad designs alive longer than they should be.

I've been in the hash-and-trust business since before most CVE programs existed.

TeamPCP Came for the Scanners

2026-03-30

The March 2026 supply chain campaign didn't just compromise popular packages. It compromised Trivy and Checkmarx — the tools you use to detect supply chain compromises.

MCP Servers: The New npm Left-Pad

2026-01-28

AI agents install MCP servers to gain tools. The MCP server ecosystem has no code signing, no security audit, and no mechanism to verify a server does what it claims. We've been here before.

Shai-Hulud: The First npm Worm

2025-09-15

A self-replicating worm tore through the npm ecosystem in September 2025. The mechanism was almost embarrassingly simple.

CLFS: Ransomware's Favorite Kernel Driver

2025-04-24

CVE-2025-29824 is the fifth exploited-in-wild LPE from the Windows Common Log File System driver. The driver has a design problem. The patch cycle hasn't addressed it.

Ivanti: The Vulnerability Subscription

2025-01-17

CVE-2025-0282 was exploited for at least 12 days before Ivanti disclosed it. Chinese APT had access to targeted networks while the patch was still being written. This is the third time in 12 months.