Security engineer based in Toronto. I break things for a living — penetration testing, vulnerability research, and AI red teaming.
OSCP certified. Currently focused on offensive security across cloud, network, and AI/ML attack surfaces.
- CVE-2026-30762 — Hardcoded JWT signing secret in LightRAG (HKUDS). Unauthenticated attackers can forge valid tokens and bypass authentication on any default deployment. HIGH severity, CVSS 7.5. Fixed in v1.4.13.
- offensive-lab — Offensive security research tools — satellite protocol fuzzing, AI adversarial techniques, orbital reconnaissance, and space infrastructure attack surface mapping
- My-Projects — Security tools including a cryptography toolkit, log retriever, and threat intelligence aggregator
- Penetration testing & red teaming
- AI/LLM security — prompt injection, abliteration, model supply chain attacks
- Vulnerability research & responsible disclosure
- Satellite & space protocol security
- Active Directory attack paths
Open to collaborating on security research, AI red teaming, or offensive tooling.
Connect with me on LinkedIn

