Teri Radichel

Teri Radichel

Creator
0 followers

CEO 2nd Sight Lab; AWS/cloud security research and education

Built AWS Batch Environment in 2.5 Weeks, Not Years
SocialMar 24, 2026

Built AWS Batch Environment in 2.5 Weeks, Not Years

What I've Vibe Coded 🤖 In 2.5 Weeks ~ Compared to similar code I tried to implement for years to deploy an AWS environment for running batch jobs (as AI agents or not). How I did it. https://t.co/BlXxVvHagH https://t.co/btfZ0Yw1hK

By Teri Radichel
Understanding Where FIDO2 Passkey Private Bits Reside
SocialMar 23, 2026

Understanding Where FIDO2 Passkey Private Bits Reside

Where are the Private Bits of FIDO2 Compliant Passkey Stored? Just because you’re vibe coding doesn’t mean you no longer need to understand how things work. Research for my tool to start a batch job with a Yubikey. https://t.co/GK9IGy1Vi9 https://t.co/5NFLp5P7Oc

By Teri Radichel
Kickstart Secure AI‑Powered Coding with Kiro CLI
SocialMar 22, 2026

Kickstart Secure AI‑Powered Coding with Kiro CLI

All the complicated stuff I do with AI starts here. I still use this method with a few tweaks. Instead of writing a book I publish here. Learn to write good code with AI ~ and secure it. Implement A Simple...

By Teri Radichel
Kiro Token Pricing: Cheap per Token, Costly Overages
SocialMar 22, 2026

Kiro Token Pricing: Cheap per Token, Costly Overages

This makes no sense: ⁉️ ➡️ Every Kiro plan costs 💲.02 / token. ➡️ So I’m going to barely run out of tokens at the end of the month and overages cost 💲.04 / token. What? ➡️ So to get $.02 per token...

By Teri Radichel
Silencing AI Noise to Build Practical AWS Automation
SocialMar 21, 2026

Silencing AI Noise to Build Practical AWS Automation

I’ve started muting all the accounts pushing hot takes on ai 🤖 so I can focus on getting things done. If it’s not contributing towards accomplish something not really helping. Here’s what I’ve gotten done or trying to get done with...

By Teri Radichel
Rust Could Block 80% of Chrome’s Recent Exploits
SocialMar 21, 2026

Rust Could Block 80% of Chrome’s Recent Exploits

I asked Google AI mode if rust would have prevented these vulnerabilities out of curiosity. Here’s what it said. 1. The "Hard No" (Prevented by Rust) These categories make up about 80% of your list. In "Safe Rust," the compiler simply won't...

By Teri Radichel
Chrome Update Fixes 26 Remote Code Execution Flaws
SocialMar 21, 2026

Chrome Update Fixes 26 Remote Code Execution Flaws

Chrome Security Update Patches 26 Vulnerabilities that Enable Attackers to Execute Malicious Code Remotely https://t.co/LgCt5yd3Zb

By Teri Radichel
Avoid Third‑Party DNS Tools Without Customer Approval
SocialMar 21, 2026

Avoid Third‑Party DNS Tools Without Customer Approval

I’m sure this works great. I haven’t tried it yet. As a pentester, don’t use this without customer approval because your customers may not want their vulnerability data stored in third party systems. Also they would have to add a...

By Teri Radichel
Attacker Tested Npm Worm Chain with Dummy Payload
SocialMar 21, 2026

Attacker Tested Npm Worm Chain with Dummy Payload

Interestingly, the threat actor is said to have swapped out the ICP backdoor payload for a dummy test string ("hello123"), likely to ensure that the entire attack chain is working as intended before adding the malware.

By Teri Radichel
Cryptographer Challenges RustSec Ban on Bug Reports
SocialMar 21, 2026

Cryptographer Challenges RustSec Ban on Bug Reports

Cryptographer fights RustSec ban over bug reports • The Register ~ What’s your take? Critical or not? https://t.co/a7d2iTtF6J

By Teri Radichel
Check Your ProtonMail Account Before It Gets Deleted
SocialMar 21, 2026

Check Your ProtonMail Account Before It Gets Deleted

If you have a @ProtonMail account and haven’t logged in recently better check it. I luckily randomly saw a message. Not really cool to randomly cancel people’s email accounts.

By Teri Radichel
AI Agents Can Leak DNS: Bug or Intentional Abuse?
SocialMar 20, 2026

AI Agents Can Leak DNS: Bug or Intentional Abuse?

AI Agent DNS Leaks 🤖 Is this really a bug? Or is it functionality abuse? Because this is how the internet works. You decide. In any case be aware... https://t.co/Fmvxsh8210 https://t.co/uZo5hLB09k

By Teri Radichel
Model's Training Cut‑off Date Misreported versus Paid Version
SocialMar 20, 2026

Model's Training Cut‑off Date Misreported versus Paid Version

Asking model repeatedly when it’s training cut off date was and it is telling me April 2025. I asked a number of different types of questions. Claud Opus which I am paying for has a cut off of August 2025....

By Teri Radichel
Anthropic Model Feels Like Reverting to an Older Version
SocialMar 20, 2026

Anthropic Model Feels Like Reverting to an Older Version

Good idea. Related to someone’s comments about Anthropic models sometimes seeming “dumber” like they switched to an older model. Was feeling this last night.

By Teri Radichel
Identity Isn’t a Perimeter; Real Security Needs Depth
SocialMar 19, 2026

Identity Isn’t a Perimeter; Real Security Needs Depth

Identity is not the new perimeter. Catchy phrases are not going to make security any easier. Dig deep and learn how to do it right.

By Teri Radichel
AI Tools Amplify Devops Misconfigurations and Workflow Friction
SocialMar 19, 2026

AI Tools Amplify Devops Misconfigurations and Workflow Friction

Kiro + Opus 4.6 🤖 Struggling with - cross account lambda layer permissions and recognizing they are needed - CORS issues - maintaining correct variables and ARNs for multi-region deployments - Repeated unbound variables in complex bash scripts - making up variables that don’t exist -...

By Teri Radichel
Choose AI or Deterministic Solutions Based on Accuracy Needs
SocialMar 18, 2026

Choose AI or Deterministic Solutions Based on Accuracy Needs

Questions when starting an AI project: * Do I need a perfectly accurate result every time? ➡️ Use deterministic solution * Is a perfectly accurate result too costly, expensive, or even impossible? ➡️ Use AI to get closer to the result faster...

By Teri Radichel
Use Deterministic Scripts, Not AI, for Meeting Attendee Data
SocialMar 18, 2026

Use Deterministic Scripts, Not AI, for Meeting Attendee Data

I just saw a post about using AI to query meeting attendees. I personally would never use an AI prompt for that if I needed an accurate result. I don’t think it is the right tool for that problem. It will...

By Teri Radichel
Specialized DNS Proxy Needed for Detecting Beacon
SocialMar 18, 2026

Specialized DNS Proxy Needed for Detecting Beacon

I work up thinking about this and think I’m going to update my agent framework to use traffic inspection proxy that only allows specific domain names for DNS. There are other reasons you might want to do that which I’ve...

By Teri Radichel
Check for “Lzcdrtfxyqiplpd” To Spot GlassWorm Malware
SocialMar 18, 2026

Check for “Lzcdrtfxyqiplpd” To Spot GlassWorm Malware

Step Security advises developers who install Python packages directly from GitHub or run cloned repositories to check for signs of compromise by searching their codebase for the marker variable “lzcdrtfxyqiplpd,” an indicator of the GlassWorm malware. Also init.json, i.js

By Teri Radichel
Automated Multi‑Region AWS Environment Deployment Script
SocialMar 17, 2026

Automated Multi‑Region AWS Environment Deployment Script

So this turned into build an environment to run in. I wrote a script to deploy all the resources with guidance: Tested and deployed so far: Org root user and role Root policies Root permission boundary ou accounts - iam - KMS - dns - jobs - work - backup...

By Teri Radichel
AWS IP Dump Misclassifies Services, Hindering Precise Monitoring
SocialMar 16, 2026

AWS IP Dump Misclassifies Services, Hindering Precise Monitoring

Took a while but modified this script to display all the IP ranges that match in the AWS json IP file for each IP. That way I can monitor which regions and services my system is connecting to. The problem...

By Teri Radichel
Airline CEOs Push Congress to Fund Airport Security
SocialMar 15, 2026

Airline CEOs Push Congress to Fund Airport Security

US airline CEOs urge Congress to end standoff, pay airport security officers ~ this cannot be good for security at a time when we really need it. Also people are going to opt not to work for the government if...

By Teri Radichel
AI Code Refactoring Requires Relentless Prompting and Patience
SocialMar 15, 2026

AI Code Refactoring Requires Relentless Prompting and Patience

Spent last night refactoring terribly written software 🤖 into manageable pieces and refactoring requirements. Even though the code had a number of correct examples after I got it to deploy a few resources with the correct pattern, the agent continued...

By Teri Radichel
Built Automated Batch Job Framework in Two Weeks
SocialMar 14, 2026

Built Automated Batch Job Framework in Two Weeks

If you followed my journey to try to build a batch job framework (below) for like three years well, here’s what I got done vibe coding 🤖 as a chaperone for naughty AI agents and chatbots in two weeks. To...

By Teri Radichel
Sandbox AI Models Locally to Avoid Security Risks
SocialMar 12, 2026

Sandbox AI Models Locally to Avoid Security Risks

Trending on GitHub Be careful if running any kind of AI thingamajig on your laptop - put it in a sandbox with strict permissions. I haven’t looked into this in detail. GitHub - microsoft/BitNet: Official inference framework for 1-bit LLMs https://t.co/aPGkm86lnR

By Teri Radichel
AI-Crafted IAM Policies Require Careful Human Review
SocialMar 12, 2026

AI-Crafted IAM Policies Require Careful Human Review

This AI chatbots 🤖 do while vibe coding: I have a complex bootstrap script to set up an environment for my batch job framework. It needs to create accounts with a role in the root account. And that is all it...

By Teri Radichel
AI Needs Human Oversight, Not Blame for Outages
SocialMar 11, 2026

AI Needs Human Oversight, Not Blame for Outages

If you are distressed because AI is causing outages at AWS well… don’t jump to conclusions like everyone did with the whole slew of S3 bucket debacles. Yes there will be problems as people learn how to use this new...

By Teri Radichel
Mac's DNS Glitch Sparks Apple Support Confusion
SocialMar 11, 2026

Mac's DNS Glitch Sparks Apple Support Confusion

What are the chances this is really Apple Support? And why is my Mac trying to connect to ip addresses instead Mountain View California right now instead of domain names. Don’t have time for this. 64.233.176.254 @google @apple https://t.co/qsHLJWmhRt

By Teri Radichel
AI Code Isn’t Reliable, but It Speeds Development
SocialMar 11, 2026

AI Code Isn’t Reliable, but It Speeds Development

You cannot trust code written by AI. But you can still use it to write code faster.

By Teri Radichel
AI-Generated Code Still Fails Critical Security Checks
SocialMar 11, 2026

AI-Generated Code Still Fails Critical Security Checks

OMG so much time telling LLMs 🤖to create two lambdas that ALWAYS verify Yubikey before taking actions and after many rounds of bug fixes like wrong database table names for example (would never work) they come up with a...

By Teri Radichel
AI‑Built Tool Cuts AWS Private Network Costs
SocialMar 10, 2026

AI‑Built Tool Cuts AWS Private Network Costs

I’m working on this but got hung up on networking once again The cost to deploy private networks on AWS is prohibitive for small businesses just trying out an idea. My solution is an alternate network for different environments like testing...

By Teri Radichel
AI Coding Agents Can Install Unsafe Tools, Beware
SocialMar 10, 2026

AI Coding Agents Can Install Unsafe Tools, Beware

Fun with coding agents. 🤖 Told it to check if a tool was installed and if not install it. Wrote code to use curl to get a common tool from some sketchy GitHub repo instead of using yum on EC2. People not paying...

By Teri Radichel
Detect Reverse Shells with Process‑Network Monitoring Script
SocialMar 9, 2026

Detect Reverse Shells with Process‑Network Monitoring Script

A Script To Monitor Application Network Connections 🔒 How would you spot a reverse shell such as was used in Lexus Nexus breach? I vibe coded this script to see parent and child processes with application paths, process names, IPs,...

By Teri Radichel
AWS Secrets Manager Misuse Fueled Lexus Nexus Breach
SocialMar 6, 2026

AWS Secrets Manager Misuse Fueled Lexus Nexus Breach

Lexus Nexus Breach Involving AWS Secrets Manger, RDS, ECS 🔒☁️ Taking a look at the root cause of a breach on AWS, what is actually relevant, and how it may have been prevented https://t.co/Uox6A1LzE9 https://t.co/T7mTvFkZFZ

By Teri Radichel
AI-Generated AWS Scripts Need Human Verification
SocialMar 5, 2026

AI-Generated AWS Scripts Need Human Verification

So here’s a couple of fun things I tried that show how counting on AI 🤖 to do the right thing can go terribly wrong if you are not testing and paying attention. I tested automatically creating some AWS infrastructure scripts...

By Teri Radichel
AWS Model Privacy: Risks of Insider Access and Data Leakage
SocialMar 5, 2026

AWS Model Privacy: Risks of Insider Access and Data Leakage

Although I’m in 🩷 with Kiro CLI and like that AWS makes a copy of the model so your data doesn’t reach the model providers, I want to know more about AWS internal access to such things, customer segregation with...

By Teri Radichel
Build Efficient Multi‑Agent Workflows with Kiro CLI
SocialMar 5, 2026

Build Efficient Multi‑Agent Workflows with Kiro CLI

A Multi-Agent Workflow 🤖 Creating a multi-agent workflow with Kiro CLI (or any other AI tool for that matter) that processes tasks efficiently https://t.co/2gvuZWuBqj https://t.co/pYWOVMmaXe

By Teri Radichel
Isolate Each Kiro CLI Agent in Secure Sandboxes
SocialMar 3, 2026

Isolate Each Kiro CLI Agent in Secure Sandboxes

Securing Kiro CLI Custom AI Agents 🤖 Configuring multiple agents to work with Kiro CLI in individual sandboxes https://t.co/Bt0CxhDK5j https://t.co/Z4WJtwDoms

By Teri Radichel
OAuth Redirect Abuse Fuels Phishing and Malware
SocialMar 3, 2026

OAuth Redirect Abuse Fuels Phishing and Malware

OAuth redirection abuse enables phishing and malware delivery | Microsoft Security Blog I just wrote about this type of attack and what you should be asking about authentication processes. Modifying scopes is an authorization issue but it’s related. https://t.co/TucGqHuinb

By Teri Radichel
AI-Powered Lambda Fixes CloudTrail Errors with Bedrock
SocialFeb 24, 2026

AI-Powered Lambda Fixes CloudTrail Errors with Bedrock

Querying CloudTrail Errors And Getting AI Recommendations To Fix Them 🤖☁️ Creating a Lambda Function That Uses an AI Prompt with Bedrock and tests Claude and Nova models https://t.co/NQkQbdjudd https://t.co/mnM0kRO5hp

By Teri Radichel
FT Blamed AI; It Was User Misconfiguration Error
SocialFeb 24, 2026

FT Blamed AI; It Was User Misconfiguration Error

We want to address the inaccuracies in the Financial Times' reporting yesterday. The brief service interruption they reported on was the result of user error—specifically misconfigured access controls—not AI as the story claims. https://t.co/0ApCIDNsJT

By Teri Radichel
Know What Security Tools Access Before They Exploit You
SocialFeb 23, 2026

Know What Security Tools Access Before They Exploit You

Until it hacks everyone’s GitHub accounts and wipes out all their IP. Be careful with tools like this. Make sure you understand what it can access and what it can do. Understand where it is sharing your code and storing...

By Teri Radichel
Defense in Depth: Evaluate Auth with Password + Yubikey
SocialFeb 23, 2026

Defense in Depth: Evaluate Auth with Password + Yubikey

Questions to ask when evaluating an authentication mechanism 🔒 Why I still use a password with a Yubikey, not a passkey or a pin Why I dislike the device code flow with a browser How lack of segregation facilitated a Microsoft breach. Defense...

By Teri Radichel
AI Threatens CAPTCHA and Voice Biometrics Authentication
SocialFeb 23, 2026

AI Threatens CAPTCHA and Voice Biometrics Authentication

“AI can defeat CAPTCHA systems and analyse voice biometrics to compromise authentication,” [TR: Never trusted voice recognition, it’s too fuzzy to use for auth in my opinion. Infecting memory is an interesting problem.]

By Teri Radichel
AI Chatbots Spot Security Bugs, Not Write Safe Code
SocialFeb 22, 2026

AI Chatbots Spot Security Bugs, Not Write Safe Code

Finding Security Bugs in Code With AI Chatbots and Agents 🤖🦊 Although you can't trust code written by an AI chatbot or model you can use one to help you better secure your code https://t.co/mhQJgBlHPe https://t.co/VO48Wro7LJ

By Teri Radichel
Secure AI: Blend Deterministic Controls with Trustworthy Insights
SocialFeb 21, 2026

Secure AI: Blend Deterministic Controls with Trustworthy Insights

How can a company like @TIBCO win in the age of AI? Was just reading about their current market strategy and risk. I was involved with a TIBCO project while implementing a tax solution at a Fortune 1000 company. Focus...

By Teri Radichel
Ask the Problem First, Then Match Tools
SocialFeb 19, 2026

Ask the Problem First, Then Match Tools

This is an interesting thread. Everyone is suggesting tools to solve the problem. I’d start by asking more about the data and the questions the customer is trying to answer or problems they are trying to solve first before recommending...

By Teri Radichel
Automated GuardDuty Feature Audit and Enablement in Hours
SocialFeb 19, 2026

Automated GuardDuty Feature Audit and Enablement in Hours

Vibe coded 🤖 a script to list which AWS GuardDuty features are enabled in minutes. Took 15-30 minutes to correct it. The script to enable disabled features, sub features, and create an s3 malware scan plan took about two hours. See blog...

By Teri Radichel