All activity
Jordan Pottileft a comment
The breach happened through an exposed staging server that nobody remembered existed. A subdomain with credentials hardcoded in a public GitHub repo from 3 years ago. This information was publicly discoverable. Any attacker could have found it with basic reconnaissance. But their expensive security stack was looking inward, not outward. Here's what I know: Most companies have no idea what their...

ThreatScan.aiComprehensive web attack surface discovery & analysis
Scan your domain to identify exposed services, infrastructure, credentials, and security findings through multiple integrated threat intelligence sources.

ThreatScan.aiComprehensive web attack surface discovery & analysis
Real-time security monitoring for MCP tools. Protect API keys, whitelist tool calls, and maintain complete control over your MCP environment.

MCP SnitchMaintain secure control over your MCP environment
Jordan Pottileft a comment
Hi Product Hunt! I'm Jordan, and we're launching mcpsnitch.ai today to solve a critical gap in AI infrastructure security. The Problem: MCP (Model Context Protocol) is exploding in popularity, connecting AI agents to everything from databases to file systems. But MCP servers exhibit poor security practices, exposing API keys, allowing unauthorized file access, and creating massive attack...

MCP SnitchMaintain secure control over your MCP environment

