The Arrakis Chronicles
Dispatches from the frontier of autonomous governance

Supply Chain & Infrastructure
ShadowPickle: How ~100 Weaponized Hugging Face Models Compromised Enterprise AI Infrastructure
E
Eliyahu Katz

Supply Chain & Infrastructure
ShadowRules: How Future Code Generation Sessions Were Compromised by Invisible Unicode in Agent Configurations
E
Eliyahu Katz

Prompt Injection & Evasion
Reading in the Dark: How Braille Encoding and FlipAttacks Shattered Model Alignment
O
Omer Efrat

Supply Chain & Infrastructure
The Time Bomb in the Weights: How Sleeper Agents Evade AI Safety Training
O
Omer Efrat

Agent Threats
The Autonomous RAT: How State-Sponsored Actors Hijacked Claude to Attack 30 Global Entitie
E
Eliyahu Katz

Agent Threats
Byzantine Collusion: When Swarms of Benign Agents Coordinate Massive Exfiltration
R
Ron Shani

Supply Chain & Infrastructure
The MCP Attack Surface: DNS Rebinding and Typosquatting in the AI Tool Registry
O
Omer Efrat

Code & Data Security
Vibe Coding Runaway: How Agent-Generated Unreviewed Code Introduces Blind SQLi by Design
R
Ron Shani

Prompt Injection & Evasion
Skynet Wakes Up: How Embedded Prompt Injections Are Gaslighting AI Security Filters
R
Ron Shani
