CirriusTech
  • Home
  • Tech
  • Projects
  • Personal
  • Fiction
  • About
  • Certifications
☕ Enjoying the content? Consider supporting me on Ko-fi

Projects & Research

Tools, Research & Open Source

Security research, open source tooling, and experimental projects. Built to explore, understand, and solve real problems.

🔬

OID-See

BloodHound for OAuth in Entra ID — maps third-party app consent, scopes, assignments, and trust signals into a graph to surface impersonation risk and OAuth sprawl.

GitHub
🔬

ISDF — Intune Stateful Device Fingerprinting

Cloud-stamped device metadata for Conditional Access — moves device trust out of the endpoint and into Azure, using TPM-rooted hardware identifiers validated by a Logic App with Managed Identity.

GitHub
🔬

KuShu — Attack & Defence Research

KuShuSec is a collection of cloud security attack and defence research, tools, and mind maps — including the KuShu-Atama attack/defence mind map repository and SPADE research.

GitHub
🔬

Az-Skywalker

A collection of Azure security research tools exposing control plane isolation flaws, cross-plane data exposure, and silent data harvesting in Microsoft Azure iPaaS services.

GitHub
🔬

The Audrey Project

A curated RSS/OPML feed collection for tech and security professionals — helping you stay current without drowning in noise.

GitHub
Recent Posts
The Model Isn't the Risk. The Harness Is (Part 3): Defending Against Runtime Abuse
The Model Isn't the Risk. …

Hero image generated by ChatGPT

This is a personal blog and all content herein is my personal opinion and not that of my employer.


This is Part 3 of a 3-part series.

Part Title
Part 1 The Leak, the Context, and the Framework …

April 2, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 2): Mapping the Trust Boundaries and the Attack Tree
The Model Isn't the Risk. …

Hero image generated by ChatGPT

This is a personal blog and all content herein is my personal opinion and not that of my employer.


This is Part 2 of a 3-part series.

Part Title
Part 1 The Leak, the Context, and the Framework …

April 2, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 1): The Leak, the Context, and the Framework
The Model Isn't the Risk. …

Hero image generated by ChatGPT

This is a personal blog and all content herein is my personal opinion and not that of my employer.


The Procurement TL;DR

If you are buying or integrating an AI Agent platform today, ignore the “magic” demos. Ask these three questions:

  1. How is my …

March 31, 2026 Read
OID-See v1.1.0: External Identity Posture, iOS Support, and New Auth Methods
OID-See v1.1.0: External …

This is a personal blog and all content herein is my own opinion and not that of my employer.


OID-See v1.1.0 is out

v1.0.1 tightened the scoring.

v1.1.0 expands what OID-See can actually see.

This is the biggest release since the initial drop: a new external identity posture surface, a fully …

March 31, 2026 Read
Self-Hosting Umami on Netlify + Azure: What I’d Do Differently (and Why Your Database Probably Isn’t the Problem)
Self-Hosting Umami on …

Self-Hosting Umami on Netlify + Azure

Prisma fights, pgcrypto drama, CSP facepalms, cold starts… and assumptions with teeth


TL;DR

I set out to self-host Umami analytics for this website using:

  • Netlify (Next.js runtime - I already host my site here so it made sense to me!)
  • Azure PostgreSQL Flexible …

March 25, 2026 Read
Synthetic Authority and Constrained Probabilism: What Overloaded Minds Teach Us About AI
Synthetic Authority and …

Hero image generated by ChatGPT

This is a personal blog. All opinions are my own and not those of my employer.


We Are Not Exploring New Territory

After publishing Capability ≠ Obligation, I had a conversation that lingered far longer than I expected.

It wasn’t with a policymaker, a …

February 15, 2026 Read
Footer logo
© 2026 All Rights Reserved