CirriusTech
  • Home
  • Tech
  • Projects
  • Personal
  • Fiction
  • About
  • Certifications
☕ Enjoying the content? Consider supporting me on Ko-fi

Projects & Research

Tools, Research & Open Source

Security research, open source tooling, and experimental projects. Built to explore, understand, and solve real problems.

🔬

OID-See

BloodHound for OAuth in Entra ID — maps third-party app consent, scopes, assignments, and trust signals into a graph to surface impersonation risk and OAuth sprawl.

GitHub
🔬

ISDF — Intune Stateful Device Fingerprinting

Cloud-stamped device metadata for Conditional Access — moves device trust out of the endpoint and into Azure, using TPM-rooted hardware identifiers validated by a Logic App with Managed Identity.

GitHub
🔬

KuShu — Attack & Defence Research

KuShuSec is a collection of cloud security attack and defence research, tools, and mind maps — including the KuShu-Atama attack/defence mind map repository and SPADE research.

GitHub
🔬

Az-Skywalker

A collection of Azure security research tools exposing control plane isolation flaws, cross-plane data exposure, and silent data harvesting in Microsoft Azure iPaaS services.

GitHub
🔬

The Audrey Project

A curated RSS/OPML feed collection for tech and security professionals — helping you stay current without drowning in noise.

GitHub
Recent Posts
Copy.Fail: When the …

Copy.Fail: When the Kernel Trusts Too Much

Sometimes you hit a vulnerability that isn’t just “bad”.

It’s clean.

Not elegant. Not pretty.

But clean in the way it slices straight through assumptions we’ve quietly depended on for years.

CVE-2026-31431 is one of those.


The shape of the …

April 29, 2026 Read
EleMENTAL
EleMENTAL

Somewhere Over Europe

Some ideas arrive fully formed. Others sort of… leak in.

This one started somewhere between Beijing and Stockholm, half-rewatching Inception on a plane, half-asleep, and very much not trying to have any original thoughts.

There’s a scene in that film about dream architecture. …

April 26, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 3): Defending Against Runtime Abuse
The Model Isn't the Risk. …

Hero image generated by ChatGPT

This is a personal blog and all content herein is my personal opinion and not that of my employer.


This is Part 3 of a 3-part series.

Part Title
Part 1 The Leak, the Context, and the Framework …

April 2, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 2): Mapping the Trust Boundaries and the Attack Tree
The Model Isn't the Risk. …

Hero image generated by ChatGPT

This is a personal blog and all content herein is my personal opinion and not that of my employer.


This is Part 2 of a 3-part series.

Part Title
Part 1 The Leak, the Context, and the Framework …

April 2, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 1): The Leak, the Context, and the Framework
The Model Isn't the Risk. …

Hero image generated by ChatGPT

This is a personal blog and all content herein is my personal opinion and not that of my employer.


The Procurement TL;DR

If you are buying or integrating an AI Agent platform today, ignore the “magic” demos. Ask these three questions:

  1. How is my …

March 31, 2026 Read
OID-See v1.1.0: External Identity Posture, iOS Support, and New Auth Methods
OID-See v1.1.0: External …

This is a personal blog and all content herein is my own opinion and not that of my employer.


OID-See v1.1.0 is out

v1.0.1 tightened the scoring.

v1.1.0 expands what OID-See can actually see.

This is the biggest release since the initial drop: a new external identity posture surface, a fully …

March 31, 2026 Read
Footer logo
© 2026 All Rights Reserved