//nefariousplan

taxonomy · how systems fail

Patterns.

Named bug-classes and conceptual frames. Each pattern is its own meta-analysis. The mechanism that gets named, plus every post that exhibits it.

27 named/27 mapped/0 unmapped

  1. Trust Inversion01
    Trust Inversion

    The tools and credentials that authorize access to your systems are now the attack surface.

    7 posts
  2. Design Debt Driver02
    Design Debt Driver

    A component whose bug-class keeps recurring. Patches address symptoms; the design holds the primitive.

    4 posts
  3. Disclosure After Exploitation03
    Disclosure After Exploitation

    Vendor discloses only after active in-wild exploitation. The gap between first-seen and CVE is the story.

    4 posts
  4. Security Tool As Primitive04
    Security Tool As Primitive

    The privileged action of your security tool becomes the attack. Defender's hands become attacker's hands.

    4 posts
  5. Content Is Command05
    Content Is Command

    External content feeds an interpreter that treats it as instructions. Prompt injection is one instance.

    3 posts
  6. Maintainer Account Compromise06
    Maintainer Account Compromise

    Single maintainer account gates publishes to millions. One compromise ships to every downstream.

    3 posts
  7. Revocation Gap07
    Revocation Gap

    The window between credential compromise and detection. Every action in that window is legitimate.

    3 posts
  8. Unauth Write To Execution Path08
    Unauth Write To Execution Path

    No auth required to write a file into a path the server executes. Webroot upload, CGI drop, etc.

    3 posts
  9. Disclaimer Wrapped Campaign Kit09
    Disclaimer Wrapped Campaign Kit

    A PoC that ships a full weaponizer behind a 'for authorized testing only' disclaimer.

    2 posts
  10. Mutable Reference As Immutable10
    Mutable Reference As Immutable

    Git tags, date-labeled artifacts, the latest tag. Treated as pinned. Not.

    2 posts
  11. Persistent Blindspot11
    Persistent Blindspot

    The attack does not steal. It makes the defender permanently blind to a class of events.

    2 posts
  12. The Detector Is The Target12
    The Detector Is The Target

    The sandbox, scanner, or SOC tool is itself the attack surface.

    2 posts
  13. Commented Out Code Is Testimony13
    Commented Out Code Is Testimony

    The capability the researcher didn't ship tells you what the capability is. Read what's commented out.

    1 post
  14. Denial By Pedantry14
    Denial By Pedantry

    'We weren't breached' via a narrow reading of their own terms. Non-denial denial.

    1 post
  15. Emergent Primitive15
    Emergent Primitive

    Individually safe components that compose into an attack. Nobody owns the intersection.

    1 post
  16. Fail Open Intercept16
    Fail Open Intercept

    Security gate can't decrypt/validate a message and forwards it anyway. Logs the failure, does the action.

    1 post
  17. Junction Preemption17
    Junction Preemption

    A privileged process writes to a directory it never pre-created with restrictive permissions. A standard user occupies the path first as an NTFS junction. The privileged write follows the attacker's redirection.

    1 post
  18. MFT as Primary Target18
    MFT as Primary Target

    Managed file transfer products carry the payload and the trust. Now carry the breaches.

    1 post
  19. Nonce Is Not Auth19
    Nonce Is Not Auth

    CSRF tokens mistaken for authentication. Valid nonce does not equal authenticated caller.

    1 post
  20. Prototype Pollution Trust Bypass20
    Prototype Pollution Trust Bypass

    A trust check that reads shared prototype state. Attacker writes once, every object reports trusted.

    1 post
  21. Security Metric Theater21
    Security Metric Theater

    Coverage reported as a fraction when only the numerator was ever the story. MFA %, EDR coverage, etc.

    1 post
  22. Self Propagating Supply Chain22
    Self Propagating Supply Chain

    Worm pattern in a package registry: infected package harvests credentials, publishes to the next.

    1 post
  23. Signing Surface Poisoning23
    Signing Surface Poisoning

    Hardware wallet / HSM / signer shows one thing, signs another. Trust boundary lives at the rendering layer.

    1 post
  24. TOCTOU That Isn't24
    TOCTOU That Isn't

    A 'race condition' that's actually deterministic. Attacker controls timing because the other side hasn't run yet.

    1 post
  25. Unpatchable Primitive25
    Unpatchable Primitive

    The bug class is too fundamental to the design. Patches close instances; the primitive remains.

    1 post
  26. Unsigned Ecosystem Echo26
    Unsigned Ecosystem Echo

    A new ecosystem replaying every lesson the old ones learned. Same registry shape, same provenance gap.

    1 post
  27. Todo That Shipped27
    Todo That Shipped

    The fix was in a comment. The code shipped without it. Audit your oldest TODOs.

    0 posts