Skip to content

Commit cfd437b

Browse files
committed
Release v2025.10.07.2
1 parent 683e9a2 commit cfd437b

14 files changed

Lines changed: 215 additions & 42 deletions

.gitlab/.gitlab-ci.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ variables:
1010
release_to_github:
1111
stage: release
1212
image: alpine:latest
13+
tags:
14+
- bj
1315
rules:
1416
- if: $CI_COMMIT_TAG
1517
before_script:
@@ -18,4 +20,5 @@ release_to_github:
1820
- git config --global user.name "$GIT_AUTHOR_NAME"
1921
script:
2022
- chmod +x "${CI_PROJECT_DIR}/.gitlab/release.sh"
21-
- "${CI_PROJECT_DIR}/.gitlab/release.sh"
23+
- "${CI_PROJECT_DIR}/.gitlab/release.sh"
24+
resource_group: production

_config.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ minimal_mistakes_skin: "dark" # "air", "aqua", "contrast", "dark", "dirt", "neon
1717
# Site Settings
1818
locale: "en-US"
1919
rtl: # true, false (default) # turns direction of the page into right to left for RTL languages
20-
title: "Zast.ai"
20+
title: "ZAST.AI"
2121
title_separator: "-"
2222
subtitle: # site tagline that appears below site title in masthead
23-
name: "Zast.ai"
24-
description: "AI agent that can identify vulnerabilities, and verify exploitability with zero false positives."
23+
name: "ZAST.AI"
24+
description: "Leading security research lab providing AI vulnerability research agents"
2525
url: "https://blog.zast.ai"
2626
baseurl: # the subpath of your site, e.g. "/blog"
2727
repository: # GitHub username/repo-name e.g. "mmistakes/minimal-mistakes"

_includes/head.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
<meta charset="utf-8" />
2-
2+
<link rel="icon" type="image/x-icon" href="{{ '/assets/img/favicon.ico' | relative_url }}">
33
{% include seo.html %} {% unless site.atom_feed.hide %}
44
<link
55
href="{% if site.atom_feed.path %}{{ site.atom_feed.path }}{% else %}{{ '/feed.xml' | relative_url }}{% endif %}"

_posts/2025-07-28-Introduce-Zast.ai.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: "A Shared Pursuit: Introducing Zast.ai"
3-
description: "Introducing Zast.ai - AI agent that can identify vulnerabilities, and verify exploitability with zero false positives. Join us in making software more secure."
4-
keywords: "Zast.ai, AI security, vulnerability detection, zero-day vulnerabilities, application security testing, automated security, code analysis, PoC generation, cybersecurity, software security"
2+
title: "A Shared Pursuit: Introducing ZAST.AI"
3+
description: "Introducing ZAST.AI - AI agent that can identify vulnerabilities, and verify exploitability with zero false positives. Join us in making software more secure."
4+
keywords: "ZAST.AI, AI security, vulnerability detection, zero-day vulnerabilities, application security testing, automated security, code analysis, PoC generation, cybersecurity, software security"
55
author: "Geng Yang"
66
date: 2025-07-29
77
categories: ["Security", "AI", "Vulnerability Assessment"]
@@ -21,7 +21,7 @@ last_modified_at: 2025-07-29
2121
---
2222

2323
**Geng Yang**
24-
Co-founder & CEO, Zast.ai
24+
Co-founder & CEO, ZAST.AI
2525
July 28, 2025, Seattle
2626

2727
---
@@ -39,19 +39,19 @@ We believe that security reports are cheap. Real impact requires proof. That's w
3939

4040
### Performance in the Real World
4141

42-
During its development, Zast.ai uncovered hundreds of zero-day vulnerabilities. Beginning July 14th 2025, we've been submitting these discoveries to [VulDB.com](https://vuldb.com/), an accredited CVE Numbering Authority (CNA).
42+
During its development, ZAST.AI uncovered hundreds of zero-day vulnerabilities. Beginning July 14th 2025, we've been submitting these discoveries to [VulDB.com](https://vuldb.com/), an accredited CVE Numbering Authority (CNA).
4343

4444
The results of the last ten days have been humbling and affirming:
4545

4646
- As of July 28th, we have submitted **78** vulnerabilities.
4747

4848
![Vulnerability submissions growth on VulDB.com]({{'/assets/img/vuldb/growth.png' | relative_url }})
4949

50-
- This effort has made Zast.ai the **#1** global contributor to VulDB for the month of July, 2025.
50+
- This effort has made ZAST.AI the **#1** global contributor to VulDB for the month of July, 2025.
5151

52-
![Zast.ai vulnerability submissions on VulDB.com]({{'/assets/img/vuldb/number1.png' | relative_url }})
52+
![ZAST.AI vulnerability submissions on VulDB.com]({{'/assets/img/vuldb/number1.png' | relative_url }})
5353

54-
- In just over a week, Zast.ai has reached **#31** among all-time global contributors on [VulDB.com](https://vuldb.com/).
54+
- In just over a week, ZAST.AI has reached **#31** among all-time global contributors on [VulDB.com](https://vuldb.com/).
5555
The impact of these discoveries extends far beyond numbers. Our vulnerability findings span from critical infrastructure components to popular development tools, representing some of the most widely-used open source projects in the world.
5656

5757
![Star count distribution of affected repositories]({{'/assets/img/vuldb/starpie.png' | relative_url }})
@@ -62,7 +62,7 @@ We don't share these numbers to boast, but to offer as a proof of concept: that
6262

6363
### How It Works: A Three-Step Process
6464

65-
Zast.ai is designed to deliver proof, not just alerts:
65+
ZAST.AI is designed to deliver proof, not just alerts:
6666

6767
1. **Candidate Generation:** It analyzes target code base to identify potential vulnerability "candidates."
6868
2. **Automated PoC Generation:** For each candidate, it generates and executes a tailored Proof of Concept against a test environment.
@@ -72,27 +72,27 @@ Zast.ai is designed to deliver proof, not just alerts:
7272

7373
### How to Get Started
7474

75-
You can integrate Zast.ai into your workflow in minutes.
75+
You can integrate ZAST.AI into your workflow in minutes.
7676

7777
1. Deploy your code in a test environment or start a local debug session.
78-
2. Visit [https://zast.ai](https://zast.ai) and follow the on-screen instructions to create an assessment task.
78+
2. Visit [https://ZAST.AI](https://zast.ai) and follow the on-screen instructions to create an assessment task.
7979
3. You'll receive an email notification when the assessment is completed.
8080

8181
---
8282

8383
### Current Limitations
8484

85-
Although Zast.ai is continuously improving every day, here are its current limitations:
85+
Although ZAST.AI is continuously improving every day, here are its current limitations:
8686

87-
- **Languages:** Zast.ai currently supports **Java** and **JavaScript/TypeScript**. Python is next in line (in beta test), and more languages are on our roadmap.
88-
- **Vulnerability Types:** Zast.ai is better with grammar-based vulnerabilities. For semantic ones, it currently supports **IDOR** and certain types of **information leakage**.
89-
- **Resource:** Zast.ai's GPU capacity is limited (we are a small start-up). If this blog generates significant demand for audits, we'll prioritize scaling our computational resources to meet your needs. If you find your job is in the queue, thank you for your patience.
87+
- **Languages:** ZAST.AI currently supports **Java** and **JavaScript/TypeScript**. Python is next in line (in beta test), and more languages are on our roadmap.
88+
- **Vulnerability Types:** ZAST.AI is better with grammar-based vulnerabilities. For semantic ones, it currently supports **IDOR** and certain types of **information leakage**.
89+
- **Resource:** ZAST.AI's GPU capacity is limited (we are a small start-up). If this blog generates significant demand for audits, we'll prioritize scaling our computational resources to meet your needs. If you find your job is in the queue, thank you for your patience.
9090

9191
---
9292

9393
### The Journey Ahead
9494

95-
We don't have all the answers. We humbly offer Zast.ai —and its findings —as a starting point and a conversation starter. Our deepest hope is that by making Zast.ai accessible, we can inspire our fellow security engineers, researchers, and builders to make our digital world more secure.
95+
We don't have all the answers. We humbly offer ZAST.AI —and its findings —as a starting point and a conversation starter. Our deepest hope is that by making ZAST.AI accessible, we can inspire our fellow security engineers, researchers, and builders to make our digital world more secure.
9696

9797
---
9898

_posts/2025-07-29-How-to-Use-Zast.ai.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: "How to Use Zast.ai"
3-
description: "Complete step-by-step guide on how to use Zast.ai for vulnerability assessment. Learn how to upload code, verify ownership, add test accounts, and get detailed security reports with zero false positives."
4-
keywords: "Zast.ai tutorial, vulnerability assessment guide, security testing, code upload, ownership verification, test accounts, security reports, AI security, automated vulnerability detection"
5-
author: "Zast.ai Team"
2+
title: "How to Use ZAST.AI"
3+
description: "Complete step-by-step guide on how to use ZAST.AI for vulnerability assessment. Learn how to upload code, verify ownership, add test accounts, and get detailed security reports with zero false positives."
4+
keywords: "ZAST.AI tutorial, vulnerability assessment guide, security testing, code upload, ownership verification, test accounts, security reports, AI security, automated vulnerability detection"
5+
author: ZAST.AI Team"
66
date: 2025-07-29
77
categories: ["Tutorial", "Security", "AI"]
88
tags: ["vulnerability assessment", "AI security", "cybersecurity"]
@@ -11,7 +11,7 @@ header:
1111
last_modified_at: 2025-07-29
1212
---
1313

14-
**Zast.ai Team**,
14+
**ZAST.AI Team**,
1515

1616
July 29, 2025, Seattle
1717

_posts/2025-07-29-Vulnerability-Disclosure-Challenges-in-Open-Source-Projects.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ tags: [CVE, Formidable, SBOM, Supply Chain Security, Responsible Disclosure, npm
88
---
99

1010
**Chris**,
11-
Co-founder, Zast.ai
11+
Co-founder, ZAST.AI
1212
Sep. 04, 2025, Toronto
1313

1414
---
@@ -196,4 +196,4 @@ Action items:
196196

197197
Enterprises may consider evolving their open source software practices toward more active oversight and collaborative responsibility.
198198

199-
As an automated vulnerability assessment AI agent, Zast.ai is continuously exploring effective approaches to dependency vulnerability assessment. Follow us on X <a href="https://twitter.com/zast_ai" target="_blank" rel="noopener noreferrer">@zast_ai</a> to discuss advancing software supply chain security.
199+
As an automated vulnerability assessment AI agent, ZAST.AI is continuously exploring effective approaches to dependency vulnerability assessment. Follow us on X <a href="https://twitter.com/zast_ai" target="_blank" rel="noopener noreferrer">@zast_ai</a> to discuss advancing software supply chain security.

_posts/2025-08-28-Finding-Zero-Day-Vulnerabilities-at-Scale.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: "Finding Zero-Day Vulnerabilities at Scale: Our Journey with Zast.ai"
3-
description: "Learn about our journey using Zast.ai to discover hundreds of zero-day vulnerabilities across the open-source ecosystem at scale, and the challenges we faced in responsibly disclosing them."
2+
title: "Finding Zero-Day Vulnerabilities at Scale: Our Journey with ZAST.AI"
3+
description: "Learn about our journey using ZAST.AI to discover hundreds of zero-day vulnerabilities across the open-source ecosystem at scale, and the challenges we faced in responsibly disclosing them."
44
author: "Chris"
55
date: 2025-09-10
66
categories: [Security, AI, Open Source]
7-
tags: [Zero-Day, Vulnerability Disclosure, Zast.ai, Log4Shell, Automation, CVE]
7+
tags: [Zero-Day, Vulnerability Disclosure, ZAST.AI, Log4Shell, Automation, CVE]
88
hidden: false
99
---
1010

1111
**Chris**,
12-
Co-founder, Zast.ai
12+
Co-founder, ZAST.AI
1313
Sep. 10, 2025, Toronto
1414

1515
---
@@ -25,7 +25,7 @@ Our mission was ambitious: systematically assess thousands of open-source projec
2525
<center><em>resource: https://xkcd.com/2347/</em></center>
2626
<br/>
2727

28-
To achieve this, we developed a comprehensive automation pipeline leveraging Zast.ai's capabilities:<br>
28+
To achieve this, we developed a comprehensive automation pipeline leveraging ZAST.AI's capabilities:<br>
2929

3030
<center><img src="{{'/assets/img/Finding-Zero-Day-Vulnerabilities-at-Scale/b2-1.png' | relative_url }}" alt="b2-1" width="750" height="auto"></center>
3131

@@ -35,19 +35,19 @@ To achieve this, we developed a comprehensive automation pipeline leveraging Zas
3535

3636
3. **Deployment Automation**: One of the biggest challenges was automatically deploying diverse projects with varying dependencies and configurations.
3737

38-
4. **Assessment with Zast.ai**: Each deployed project was assessed using Zast.ai to identify potential vulnerabilities.
38+
4. **Assessment with ZAST.AI**: Each deployed project was assessed using Zast.ai to identify potential vulnerabilities.
3939

4040
5. **Result Aggregation**: Findings from individual assessments were collected and consolidated into comprehensive reports.
4141

4242
## Discovering Hundreds of Zero-Day Vulnerabilities
4343

44-
Through our systematic approach and the power of Zast.ai, we successfully identified hundreds of zero-day vulnerabilities across a wide range of open-source projects. These findings included critical issues in popular libraries, frameworks, and tools that are integral to modern software development.
44+
Through our systematic approach and the power of ZAST.AI, we successfully identified hundreds of zero-day vulnerabilities across a wide range of open-source projects. These findings included critical issues in popular libraries, frameworks, and tools that are integral to modern software development.
4545

4646
Each vulnerability was verified with a working Proof of Concept (PoC) and a demonstrated exploit, ensuring the accuracy and impact of our discoveries.
4747

4848
<center><img src="{{'/assets/img/Finding-Zero-Day-Vulnerabilities-at-Scale/vuldb.png' | relative_url }}" alt="vuldb" width="750" height="auto"></center>
4949

50-
Following responsible disclosure practices, we are in the process of reporting these vulnerabilities through proper channels. For a complete list of vulnerabilities discovered by [Zast.ai](https://zast.ai/){:target="_blank"}, that have completed the disclosure process, please see [https://www.cve.org/CVERecord/SearchResults?query=zast.ai](https://www.cve.org/CVERecord/SearchResults?query=zast.ai){:target="_blank"}.
50+
Following responsible disclosure practices, we are in the process of reporting these vulnerabilities through proper channels. For a complete list of vulnerabilities discovered by [ZAST.AI](https://zast.ai/){:target="_blank"}, that have completed the disclosure process, please see [https://www.cve.org/CVERecord/SearchResults?query=zast.ai](https://www.cve.org/CVERecord/SearchResults?query=zast.ai){:target="_blank"}.
5151

5252
## The Disclosure Journey: Triumphs and Tibulations
5353

@@ -69,7 +69,7 @@ One particularly illustrative example of these challenges is detailed in our sep
6969

7070
## Looking Forward: Building a More Secure Open Source Community
7171

72-
Our journey with Zast.ai has been both challenging and rewarding. Through automation and collaboration, we've taken significant steps toward proactively securing the open-source ecosystem. However, this is just the beginning.
72+
Our journey with ZAST.AI has been both challenging and rewarding. Through automation and collaboration, we've taken significant steps toward proactively securing the open-source ecosystem. However, this is just the beginning.
7373

7474
We envision a future where:
7575

_posts/2025-09-19-Vulnerability-Assessments-Without-PoC-Are-a-Waste-of-Time!.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: "Vulnerability Assessments Without PoC Are a Waste of Time!"
33
description: "Discover why vulnerability assessments without a Proof of Concept (PoC) are a waste of time. This article explores how AI and LLMs can automatically generate effective PoCs for vulnerabilities like SSRF and Path Injection, enabling teams to validate real risks quickly and eliminate false positives."
4-
author: "Zast.ai Team"
4+
author: "ZAST.AI Team"
55
date: 2025-09-19
66
categories: [Security, AI, Tech Insights]
7-
tags: [Vulnerability Assessment, Proof of Concept, Zast.ai, AI in Cybersecurity, LLM, SSRF, Path Injection, RCE, File Upload Vulnerability, Automated Security Testing, Application Security, Vulnerability Validation, False Positives]
7+
tags: [Vulnerability Assessment, Proof of Concept, ZAST.AI, AI in Cybersecurity, LLM, SSRF, Path Injection, RCE, File Upload Vulnerability, Automated Security Testing, Application Security, Vulnerability Validation, False Positives]
88
hidden: false
99
---
1010

11-
**Zast.ai Team**,
11+
**ZAST.AI Team**,
1212

1313
Sep. 19, 2025, Seattle
1414

@@ -127,7 +127,7 @@ print('Response Text:', response.text)
127127

128128
<center><img src="{{'/assets/img/Vulnerability-Assessments-Without-PoC-Are-a-Waste-of-Time!/result.png' | relative_url }}" alt="result" width="750" height="auto"></center>
129129

130-
From the vulnerable code and the POC, we can see that the `fileType` parameter controls the file upload type. This means that the file extension whitelist allows threat actor to modify at will. In this case, Zast.ai used a PDF file with an XSS payload to demonstrate the file upload vulnerability.
130+
From the vulnerable code and the POC, we can see that the `fileType` parameter controls the file upload type. This means that the file extension whitelist allows threat actor to modify at will. In this case, ZAST.AI used a PDF file with an XSS payload to demonstrate the file upload vulnerability.
131131

132132
Next, let’s copy the POC code to our local machine for testing:
133133

@@ -178,7 +178,7 @@ Finally, once added, we can manipulate the backdoor to control the target Web se
178178
179179
<center><img src="{{'/assets/img/Vulnerability-Assessments-Without-PoC-Are-a-Waste-of-Time!/false.png' | relative_url }}" alt="false" width="750" height="auto"></center>
180180
181-
So, by simply tweaking the POC zast.ai provided for the file upload vulnerability, we’ve easily landed an RCE vulnerability.
181+
So, by simply tweaking the POC ZAST.AI provided for the file upload vulnerability, we’ve easily landed an RCE vulnerability.
182182
183183
The above examples show how well LLMs can automate POC generation. Traditional methods, on the other hand, have many challenges and limitations.
184184

0 commit comments

Comments
 (0)