SANKET SARKAR

SANKET SARKAR

CRMLCRML
Founder, Zeron, Cyber Risk Intelligence

Forums

Vision for CRML

Cyber risk today is mostly documented in spreadsheets, PDFs, and slide decks formats that are hard to version, automate, or integrate with tooling.

CRML (Cyber Risk Modeling Language) aims to represent cyber risk as structured, machine-readable models instead of documents. This allows risk scenarios to be version-controlled, generated by tools, and executed through simulations.

SANKET SARKAR

24d ago

CRML Code - The AI CLI for CRML practitioners.

CRML Code is an AI-powered CLI that brings CRML to practitioners who don’t want to write YAML. Give it a company name, vulnerability scan, or simple prompt, and it automatically generates structured CRML scenarios. It resolves organizational context, builds realistic cyber risk models, and runs large-scale simulations to produce financially grounded risk insights and control impact analysis.
SANKET SARKAR

1mo ago

How I built an internal compliance tracking tool?

I didn t build our internal compliance tracking tool the traditional way.

I vibecoded it.

Instead of long PRDs, heavy sprint planning, and weeks of back-and-forth, I stayed close to the problem and built in tight feedback loops shipping small, observing behavior, and iterating fast.

The flow was simple:

SANKET SARKAR

1mo ago

Human Exploitability System - What if a person in the organization goes rogue?

The Human Exploitability System (HES) is a research project designed to assess and quantify human risk in cybersecurity contexts. By analyzing physiological and behavioral signals, the system calculates a real-time "exploitability score" that reflects an individual's susceptibility to social engineering and other security threats. This project combines a Python-based analysis engine with a React-based frontend to visualize risk metrics, state dominance, and potential exploit scenarios.

Features of Sense

Key Features

Next-Gen AI Gateway

  • Transparent Proxy: Routes traffic to OpenAI, Anthropic, or Local LLMs (Ollama) seamlessly.

  • Policy Enforcement: Blocks malicious requests (e.g., Prompt Injection) and prevents sensitive data leaks (DLP) in real-time.

  • Dynamic Configuration: Manage routes and backends directly from the UI without restarts.

Advanced Visualization & Dashboard

SANKET SARKAR

1mo ago

Sense AI - Shadow Exposure & eNterprise Surveillance for AI

SENSE (Shadow Exposure & eNterprise Surveillance for AI) is an advanced AI Security Platform designed to monitor, control, and secure AI adoption within the enterprise. It features a transparent AI Gateway that intercepts and inspects LLM traffic, enforcing granular security policies for Data Loss Prevention (DLP) and Prompt Injection protection.

What would you expect from an AI copilot for cyber risk?

We built ZIN Advisor to go beyond dashboards helping teams think, reason, and decide faster.

Would love feedback from the community:

  • What should a cyber risk copilot do really well?

  • What frustrates you about current security tooling?

  • Any must-have integrations or workflows?

Your input helps shape what comes next.

SANKET SARKAR

1mo ago

ZIN Advisor - Your Cyber Risk Copilot

ZIN Advisor — The Cyber Risk Copilot is a thinking partner built on decision intelligence, designed to evolve with how cyber risk is understood and acted upon. From policy analysis and contextual dashboards to connected insights across your security ecosystem, it transforms complexity into clarity — enabling faster, smarter decisions today while shaping how cyber leadership works tomorrow. Use it and let us know your review

Cyber risk is finally getting the “as-code” treatment — and it’s about time.

We ve standardized infrastructure, deployments, and networks using code, but risk has largely remained trapped in spreadsheets, static registers, and fragmented tooling. CRML feels like a strong step toward making cyber risk portable, machine-readable, and automation-ready.

What stands out is the framework-agnostic approach. Organizations today don t operate in a single control universe they juggle ISO, NIST, CIS, regulatory mandates, and internal models. A declarative layer that can sit above these and enable simulation, telemetry mapping, and quantification could significantly improve how leaders understand and act on cyber exposure.

Excited to see where this goes especially the possibilities around integrating risk models into real-time decision systems and bridging the gap between security operations and business risk.

SANKET SARKAR

2mo ago

CRML - CRML is a declaritive language for writing cyberrisk as code

We have infrastructure as a code, network as a code but dont have anything as Risk As a Code. CRML is an open, declarative, engine-agnostic and Control / Attack framework–agnostic Cyber Risk Modeling Language. It provides a YAML/JSON format for describing cyber risk models, telemetry mappings, simulation pipelines, dependencies, and output requirements — without forcing you into a specific quantification method, simulation engine, or security-control / threat catalog.
SANKET SARKAR

2mo ago

Introducing Myself

Hi Community,

This is Sanket here. Building in the space of agnetic cyber risk management. Here to explore whats being built in the space and eventually launch my new product here. Anything that you think I should keep in mind let me know.

1Password warns: "Do not use OpenClaw on a company device"

Writing on the @1Password blog, Jason Meller says that he found that the top downloaded OpenClaw skill was a malware delivery vehicle:

While browsing ClawHub (I won t link it for obvious reasons), I noticed the top downloaded skill at the time was a Twitter skill. It looked normal: description, intended use, an overview, the kind of thing you d expect to install without a second thought.

But the very first thing it did was introduce a required dependency named openclaw-core, along with platform-specific install steps. Those steps included convenient links ( here , this link ) that appeared to be normal documentation pointers.

They weren t.

Both links led to malicious infrastructure.

Indeed, this wasn't an isolated case.