Petr Stuchlík
banner
stuchl4n3k.bsky.social
Petr Stuchlík
@stuchl4n3k.bsky.social
I do the nifty network stuff. Security enthusiast. Collector of PCB pretties. Dev at NetrixOne.

🔑 0xADAB0057
Reposted by Petr Stuchlík
⚠️ Connected alarms hacked live on French TV! Our TF1 news demo from 10 days ago 🔓
www.tf1.fr/tf1/jt-20h/v...
December 16, 2025 at 12:30 AM
Reposted by Petr Stuchlík
The wait is over! Phrack 72 40th Anniversary Edition is available now.

Order straight to your doorstep — the perfect gift for your fellow hacker, just in time for the holidays 🎄

No need to go to rely on the warez scene with scans anymore 😅

Order here: www.lulu.com/shop/phrack-...
December 13, 2025 at 9:34 AM
Reposted by Petr Stuchlík
New paper out in @science.org! We unveil the online manipulation market with the Cambridge Online Trust & Safety Index (COTSI). We show in real time the cost of purchasing fake accounts across every social platform around the world - so they can be held accountable

www.science.org/doi/10.1126/...
Mapping the online manipulation economy
A market perspective on digital manipulation may help improve online trust and safety
www.science.org
December 11, 2025 at 7:05 PM
Reposted by Petr Stuchlík
Literally a week ago Musk said that falsely labeling people as Nazis "should be treated as incitement to murder." And here he is (falsely) labeling the EU as Nazis.
December 8, 2025 at 5:35 AM
Reposted by Petr Stuchlík
AI tooling and MCP servers are entering enterprises fast, often faster than security teams can assess the risks.

During a recent engagement, @xpnsec.com found a new Claude Code vuln (CVE-2025-64755) while exploring MCP abuse paths.

👀 Read the details: ghst.ly/49ybl4W
An Evening with Claude (Code) - SpecterOps
This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.
ghst.ly
November 21, 2025 at 4:34 PM