You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _posts/2025-07-28-Introduce-Zast.ai.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: "A Shared Pursuit: Introducing Zast.ai"
3
-
description: "Introducing Zast.ai - AI agent that can identify vulnerabilities, and verify exploitability with zero false positives. Join us in making software more secure."
description: "Introducing ZAST.AI - AI agent that can identify vulnerabilities, and verify exploitability with zero false positives. Join us in making software more secure."
@@ -39,19 +39,19 @@ We believe that security reports are cheap. Real impact requires proof. That's w
39
39
40
40
### Performance in the Real World
41
41
42
-
During its development, Zast.ai uncovered hundreds of zero-day vulnerabilities. Beginning July 14th 2025, we've been submitting these discoveries to [VulDB.com](https://vuldb.com/), an accredited CVE Numbering Authority (CNA).
42
+
During its development, ZAST.AI uncovered hundreds of zero-day vulnerabilities. Beginning July 14th 2025, we've been submitting these discoveries to [VulDB.com](https://vuldb.com/), an accredited CVE Numbering Authority (CNA).
43
43
44
44
The results of the last ten days have been humbling and affirming:
45
45
46
46
- As of July 28th, we have submitted **78** vulnerabilities.
47
47
48
48

49
49
50
-
- This effort has made Zast.ai the **#1** global contributor to VulDB for the month of July, 2025.
50
+
- This effort has made ZAST.AI the **#1** global contributor to VulDB for the month of July, 2025.
51
51
52
-

52
+

53
53
54
-
- In just over a week, Zast.ai has reached **#31** among all-time global contributors on [VulDB.com](https://vuldb.com/).
54
+
- In just over a week, ZAST.AI has reached **#31** among all-time global contributors on [VulDB.com](https://vuldb.com/).
55
55
The impact of these discoveries extends far beyond numbers. Our vulnerability findings span from critical infrastructure components to popular development tools, representing some of the most widely-used open source projects in the world.
56
56
57
57

@@ -62,7 +62,7 @@ We don't share these numbers to boast, but to offer as a proof of concept: that
62
62
63
63
### How It Works: A Three-Step Process
64
64
65
-
Zast.ai is designed to deliver proof, not just alerts:
65
+
ZAST.AI is designed to deliver proof, not just alerts:
66
66
67
67
1.**Candidate Generation:** It analyzes target code base to identify potential vulnerability "candidates."
68
68
2.**Automated PoC Generation:** For each candidate, it generates and executes a tailored Proof of Concept against a test environment.
@@ -72,27 +72,27 @@ Zast.ai is designed to deliver proof, not just alerts:
72
72
73
73
### How to Get Started
74
74
75
-
You can integrate Zast.ai into your workflow in minutes.
75
+
You can integrate ZAST.AI into your workflow in minutes.
76
76
77
77
1. Deploy your code in a test environment or start a local debug session.
78
-
2. Visit [https://zast.ai](https://zast.ai) and follow the on-screen instructions to create an assessment task.
78
+
2. Visit [https://ZAST.AI](https://zast.ai) and follow the on-screen instructions to create an assessment task.
79
79
3. You'll receive an email notification when the assessment is completed.
80
80
81
81
---
82
82
83
83
### Current Limitations
84
84
85
-
Although Zast.ai is continuously improving every day, here are its current limitations:
85
+
Although ZAST.AI is continuously improving every day, here are its current limitations:
86
86
87
-
-**Languages:**Zast.ai currently supports **Java** and **JavaScript/TypeScript**. Python is next in line (in beta test), and more languages are on our roadmap.
88
-
-**Vulnerability Types:**Zast.ai is better with grammar-based vulnerabilities. For semantic ones, it currently supports **IDOR** and certain types of **information leakage**.
89
-
-**Resource:**Zast.ai's GPU capacity is limited (we are a small start-up). If this blog generates significant demand for audits, we'll prioritize scaling our computational resources to meet your needs. If you find your job is in the queue, thank you for your patience.
87
+
-**Languages:**ZAST.AI currently supports **Java** and **JavaScript/TypeScript**. Python is next in line (in beta test), and more languages are on our roadmap.
88
+
-**Vulnerability Types:**ZAST.AI is better with grammar-based vulnerabilities. For semantic ones, it currently supports **IDOR** and certain types of **information leakage**.
89
+
-**Resource:**ZAST.AI's GPU capacity is limited (we are a small start-up). If this blog generates significant demand for audits, we'll prioritize scaling our computational resources to meet your needs. If you find your job is in the queue, thank you for your patience.
90
90
91
91
---
92
92
93
93
### The Journey Ahead
94
94
95
-
We don't have all the answers. We humbly offer Zast.ai —and its findings —as a starting point and a conversation starter. Our deepest hope is that by making Zast.ai accessible, we can inspire our fellow security engineers, researchers, and builders to make our digital world more secure.
95
+
We don't have all the answers. We humbly offer ZAST.AI —and its findings —as a starting point and a conversation starter. Our deepest hope is that by making ZAST.AI accessible, we can inspire our fellow security engineers, researchers, and builders to make our digital world more secure.
Copy file name to clipboardExpand all lines: _posts/2025-07-29-How-to-Use-Zast.ai.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
-
title: "How to Use Zast.ai"
3
-
description: "Complete step-by-step guide on how to use Zast.ai for vulnerability assessment. Learn how to upload code, verify ownership, add test accounts, and get detailed security reports with zero false positives."
description: "Complete step-by-step guide on how to use ZAST.AI for vulnerability assessment. Learn how to upload code, verify ownership, add test accounts, and get detailed security reports with zero false positives."
Enterprises may consider evolving their open source software practices toward more active oversight and collaborative responsibility.
198
198
199
-
As an automated vulnerability assessment AI agent, Zast.ai is continuously exploring effective approaches to dependency vulnerability assessment. Follow us on X <ahref="https://twitter.com/zast_ai"target="_blank"rel="noopener noreferrer">@zast_ai</a> to discuss advancing software supply chain security.
199
+
As an automated vulnerability assessment AI agent, ZAST.AI is continuously exploring effective approaches to dependency vulnerability assessment. Follow us on X <ahref="https://twitter.com/zast_ai"target="_blank"rel="noopener noreferrer">@zast_ai</a> to discuss advancing software supply chain security.
Copy file name to clipboardExpand all lines: _posts/2025-08-28-Finding-Zero-Day-Vulnerabilities-at-Scale.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,15 @@
1
1
---
2
-
title: "Finding Zero-Day Vulnerabilities at Scale: Our Journey with Zast.ai"
3
-
description: "Learn about our journey using Zast.ai to discover hundreds of zero-day vulnerabilities across the open-source ecosystem at scale, and the challenges we faced in responsibly disclosing them."
2
+
title: "Finding Zero-Day Vulnerabilities at Scale: Our Journey with ZAST.AI"
3
+
description: "Learn about our journey using ZAST.AI to discover hundreds of zero-day vulnerabilities across the open-source ecosystem at scale, and the challenges we faced in responsibly disclosing them."
@@ -35,19 +35,19 @@ To achieve this, we developed a comprehensive automation pipeline leveraging Zas
35
35
36
36
3.**Deployment Automation**: One of the biggest challenges was automatically deploying diverse projects with varying dependencies and configurations.
37
37
38
-
4.**Assessment with Zast.ai**: Each deployed project was assessed using Zast.ai to identify potential vulnerabilities.
38
+
4.**Assessment with ZAST.AI**: Each deployed project was assessed using Zast.ai to identify potential vulnerabilities.
39
39
40
40
5.**Result Aggregation**: Findings from individual assessments were collected and consolidated into comprehensive reports.
41
41
42
42
## Discovering Hundreds of Zero-Day Vulnerabilities
43
43
44
-
Through our systematic approach and the power of Zast.ai, we successfully identified hundreds of zero-day vulnerabilities across a wide range of open-source projects. These findings included critical issues in popular libraries, frameworks, and tools that are integral to modern software development.
44
+
Through our systematic approach and the power of ZAST.AI, we successfully identified hundreds of zero-day vulnerabilities across a wide range of open-source projects. These findings included critical issues in popular libraries, frameworks, and tools that are integral to modern software development.
45
45
46
46
Each vulnerability was verified with a working Proof of Concept (PoC) and a demonstrated exploit, ensuring the accuracy and impact of our discoveries.
Following responsible disclosure practices, we are in the process of reporting these vulnerabilities through proper channels. For a complete list of vulnerabilities discovered by [Zast.ai](https://zast.ai/){:target="_blank"}, that have completed the disclosure process, please see [https://www.cve.org/CVERecord/SearchResults?query=zast.ai](https://www.cve.org/CVERecord/SearchResults?query=zast.ai){:target="_blank"}.
50
+
Following responsible disclosure practices, we are in the process of reporting these vulnerabilities through proper channels. For a complete list of vulnerabilities discovered by [ZAST.AI](https://zast.ai/){:target="_blank"}, that have completed the disclosure process, please see [https://www.cve.org/CVERecord/SearchResults?query=zast.ai](https://www.cve.org/CVERecord/SearchResults?query=zast.ai){:target="_blank"}.
51
51
52
52
## The Disclosure Journey: Triumphs and Tibulations
53
53
@@ -69,7 +69,7 @@ One particularly illustrative example of these challenges is detailed in our sep
69
69
70
70
## Looking Forward: Building a More Secure Open Source Community
71
71
72
-
Our journey with Zast.ai has been both challenging and rewarding. Through automation and collaboration, we've taken significant steps toward proactively securing the open-source ecosystem. However, this is just the beginning.
72
+
Our journey with ZAST.AI has been both challenging and rewarding. Through automation and collaboration, we've taken significant steps toward proactively securing the open-source ecosystem. However, this is just the beginning.
Copy file name to clipboardExpand all lines: _posts/2025-09-19-Vulnerability-Assessments-Without-PoC-Are-a-Waste-of-Time!.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
2
title: "Vulnerability Assessments Without PoC Are a Waste of Time!"
3
3
description: "Discover why vulnerability assessments without a Proof of Concept (PoC) are a waste of time. This article explores how AI and LLMs can automatically generate effective PoCs for vulnerabilities like SSRF and Path Injection, enabling teams to validate real risks quickly and eliminate false positives."
4
-
author: "Zast.ai Team"
4
+
author: "ZAST.AI Team"
5
5
date: 2025-09-19
6
6
categories: [Security, AI, Tech Insights]
7
-
tags: [Vulnerability Assessment, Proof of Concept, Zast.ai, AI in Cybersecurity, LLM, SSRF, Path Injection, RCE, File Upload Vulnerability, Automated Security Testing, Application Security, Vulnerability Validation, False Positives]
7
+
tags: [Vulnerability Assessment, Proof of Concept, ZAST.AI, AI in Cybersecurity, LLM, SSRF, Path Injection, RCE, File Upload Vulnerability, Automated Security Testing, Application Security, Vulnerability Validation, False Positives]
From the vulnerable code and the POC, we can see that the `fileType` parameter controls the file upload type. This means that the file extension whitelist allows threat actor to modify at will. Inthiscase, Zast.ai used a PDF file with an XSS payload to demonstrate the file upload vulnerability.
130
+
From the vulnerable code and the POC, we can see that the `fileType` parameter controls the file upload type. This means that the file extension whitelist allows threat actor to modify at will. Inthiscase, ZAST.AI used a PDF file with an XSS payload to demonstrate the file upload vulnerability.
131
131
132
132
Next, let’s copy the POC code to our local machine for testing:
133
133
@@ -178,7 +178,7 @@ Finally, once added, we can manipulate the backdoor to control the target Web se
0 commit comments