//nefariousplan

taxonomy · how systems fail

Patterns.

Named bug-classes and conceptual frames. Each pattern is its own meta-analysis. The mechanism that gets named, plus every post that exhibits it.

26 named/24 mapped/2 unmapped

  1. Trust Inversion01
    Trust Inversion

    The tools and credentials that authorize access to your systems are now the attack surface.

    6 posts
  2. Design Debt Driver02
    Design Debt Driver

    A component whose bug-class keeps recurring. Patches address symptoms; the design holds the primitive.

    3 posts
  3. Disclosure After Exploitation03
    Disclosure After Exploitation

    Vendor discloses only after active in-wild exploitation. The gap between first-seen and CVE is the story.

    3 posts
  4. Maintainer Account Compromise04
    Maintainer Account Compromise

    Single maintainer account gates publishes to millions. One compromise ships to every downstream.

    3 posts
  5. Revocation Gap05
    Revocation Gap

    The window between credential compromise and detection. Every action in that window is legitimate.

    3 posts
  6. Security Tool As Primitive06
    Security Tool As Primitive

    The privileged action of your security tool becomes the attack. Defender's hands become attacker's hands.

    3 posts
  7. Content Is Command07
    Content Is Command

    External content feeds an interpreter that treats it as instructions. Prompt injection is one instance.

    2 posts
  8. Emergent Primitive08
    Emergent Primitive

    Individually safe components that compose into an attack. Nobody owns the intersection.

    2 posts
  9. Mutable Reference As Immutable09
    Mutable Reference As Immutable

    Git tags, date-labeled artifacts, the latest tag. Treated as pinned. Not.

    2 posts
  10. Persistent Blindspot10
    Persistent Blindspot

    The attack does not steal. It makes the defender permanently blind to a class of events.

    2 posts
  11. The Detector Is The Target11
    The Detector Is The Target

    The sandbox, scanner, or SOC tool is itself the attack surface.

    2 posts
  12. TOCTOU That Isn't12
    unmappedTOCTOU That Isn't

    A 'race condition' that's actually deterministic. Attacker controls timing because the other side hasn't run yet.

    2 posts
  13. Unauth Write To Execution Path13
    Unauth Write To Execution Path

    No auth required to write a file into a path the server executes. Webroot upload, CGI drop, etc.

    2 posts
  14. Unpatchable Primitive14
    Unpatchable Primitive

    The bug class is too fundamental to the design. Patches close instances; the primitive remains.

    2 posts
  15. Commented Out Code Is Testimony15
    Commented Out Code Is Testimony

    The capability the researcher didn't ship tells you what the capability is. Read what's commented out.

    1 post
  16. Denial By Pedantry16
    Denial By Pedantry

    'We weren't breached' via a narrow reading of their own terms. Non-denial denial.

    1 post
  17. Disclaimer Wrapped Campaign Kit17
    Disclaimer Wrapped Campaign Kit

    A PoC that ships a full weaponizer behind a 'for authorized testing only' disclaimer.

    1 post
  18. Fail Open Intercept18
    Fail Open Intercept

    Security gate can't decrypt/validate a message and forwards it anyway. Logs the failure, does the action.

    1 post
  19. MFT as Primary Target19
    MFT as Primary Target

    Managed file transfer products carry the payload and the trust. Now carry the breaches.

    1 post
  20. Nonce Is Not Auth20
    Nonce Is Not Auth

    CSRF tokens mistaken for authentication. Valid nonce does not equal authenticated caller.

    1 post
  21. Prototype Pollution Trust Bypass21
    Prototype Pollution Trust Bypass

    A trust check that reads shared prototype state. Attacker writes once, every object reports trusted.

    1 post
  22. Self Propagating Supply Chain22
    Self Propagating Supply Chain

    Worm pattern in a package registry: infected package harvests credentials, publishes to the next.

    1 post
  23. Signing Surface Poisoning23
    Signing Surface Poisoning

    Hardware wallet / HSM / signer shows one thing, signs another. Trust boundary lives at the rendering layer.

    1 post
  24. Todo That Shipped24
    Todo That Shipped

    The fix was in a comment. The code shipped without it. Audit your oldest TODOs.

    1 post
  25. Unsigned Ecosystem Echo25
    Unsigned Ecosystem Echo

    A new ecosystem replaying every lesson the old ones learned. Same registry shape, same provenance gap.

    1 post
  26. Security Metric Theater26
    unmappedSecurity Metric Theater

    Coverage reported as a fraction when only the numerator was ever the story. MFA %, EDR coverage, etc.

    0 posts