bug-bounty451
google354
xss338
microsoft283
facebook246
apple171
exploit163
rce160
malware102
account-takeover95
cve91
bragging-post86
csrf83
browser77
writeup75
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
docker51
ssrf51
phishing50
aws48
access-control47
oauth45
smart-contract45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor35
vulnerability-disclosure32
smart-contract-vulnerability32
clickjacking31
burp-suite31
info-disclosure31
race-condition31
web-application31
reverse-engineering31
wordpress30
input-validation30
web-security29
information-disclosure29
cloud29
reflected-xss29
solidity27
0
2/10
threat-intel
This is a Runlayer marketing/blog hub aggregating articles about Model Context Protocol (MCP) security risks including prompt injection, social engineering of AI agents, malicious MCP servers, and data exfiltration vulnerabilities, along with enterprise security solutions and best practices for securing MCP implementations.
mcp
model-context-protocol
ai-agent-security
prompt-injection
social-engineering
data-exfiltration
oauth
dynamic-client-registration
enterprise-security
tool-gateway
owasp-top-10
sandbox
authentication
access-control
Runlayer
OpenAI
Anthropic
Google
Claude Opus
OpenClaw
Cursor
GitHub
Box
AAIF
Linux Foundation
OWASP
Vitor Balocco
Tal Peretz
Alex Frazer
Jake Moghtader
0
5/10
architecture-guide
Technical comparison of three AI tool primitives—Skills (documented processes), CLIs (composable developer tools), and MCPs (authenticated SaaS access with guardrails)—explaining when each excels based on use case, access control needs, and team composition rather than treating them as competing solutions.
ai-tools
agent-architecture
mcp
cli
access-control
authentication
automation
workflow-design
skills
api-integration
sandbox
Claude
Anthropic
Vercel
Netlify
GitHub CLI
Cloudflare Wrangler
Playwright
Attio
LinkedIn
Outlook
jngiam
David Cramer