LLM threat modeling
./probe
naveen.sec boot console
// Offensive Security Engineer
AI Security · Cloud-Native Pentesting · Tool Builder
Turning offensive depth into defensive_
-// about.log
Seven-plus years in product offense, identity abuse testing, and AI-integrated security engineering.
Lead Security Analyst
2023 - Present
Leading threat-led offensive validation for customer-facing platforms and AI-assisted approval flows.
Application Security Consultant
2021 - 2023
Drove secure SDLC adoption and attack-surface reduction programs across regulated global environments.
Security Engineer
2019 - 2021
Built cloud security baselines and offensive test playbooks for large distributed systems.
Security Analyst
2017 - 2019
Performed deep web/API assessments, threat modeling, and incident-driven hardening for payment workloads.
-// capability.matrix
ai
Control model behavior under adversarial pressure.
LLM threat modeling
./probe
prompt injection
./probe
RAG poisoning
./probe
agent sandbox escape
./probe
-// research.ops
WAT-9
AI-driven attack path engine for chained exploit discovery.
[graph] node: auth-gateway -> llm-broker
[risk] privilege edge discovered
[queue] exploit chain emitted
AX-3
Adaptive XSS payload mutation against modern filter logic.
payload:v12 -> <svg/onload=...>
bypass: sanitizer rule #14
result: reflected sink reached
ART-L
LLM attack testing framework for tool-calling workflows.
run: tool-calling abuse suite
seed: prompt-injection-omega
status: 6/8 exploit paths validated
STC-4
Subdomain takeover detection with continuous recon signals.
scan: 421 records parsed
match: orphan CNAME surfaced
alert: takeover candidate confirmed
-// attack.scenarios
Enumerate token relay points and weak trust assertions between identity providers.
Craft a forged relay flow that preserves valid session artifacts during redirect.
Bind the forged token stream into a victim-linked session context.
Escalate role scope through federated mapping drift and stale claims.
⚠ impact
Full account takeover across federated tenants.
-// operator.history
High-impact offensive programs across enterprise platforms, cloud workloads, and identity surfaces.
2023 - Present
Lead Security Analyst
2021 - 2023
Application Security Consultant
2019 - 2021
Security Engineer
2017 - 2019
Security Analyst
-// hall.of.impact
Chained SSO misconfiguration across identity providers to expose tokens and achieve account takeover.
Triggered XML entity resolution in document processing to read internal files and backend metadata.
Server-side fetch path reached cloud metadata endpoint and exposed role credentials.
Redirect and session handling weaknesses enabled privilege escalation paths.
Injected instruction chain overrode policy and drove unauthorized tool invocation.
Multi-step workflow abuse allowed unauthorized transaction intent mutation.
-// tech-stack
OSCP
CEH
CISSP (in progress)
AWS Security Specialty
-// contact.sh
terminal
$ help
help | whoami | ls /skills | cat /contact | connect <msg> | clear