DEV Community

Alessandro Pignati profile picture

Alessandro Pignati

Alessandro Pignati is a Security Researcher at NeuralTrust focused on Agentic and LLM Security, contributor to OWASP GenAI Top 10 and Black Hat USA 2024 Scholar

Location Barcelona, Spain Joined Joined on 

Education

Politecnico di Milano

Pronouns

He/Him

Work

AI Security Researcher @ Neuraltrust

Architecting the Internet of Agents: A Deep Dive into Coral Protocol Security

Architecting the Internet of Agents: A Deep Dive into Coral Protocol Security

6
Comments
7 min read
From DAN to AutoDAN-Turbo: The Wild Evolution of AI Jailbreaking 🚀

From DAN to AutoDAN-Turbo: The Wild Evolution of AI Jailbreaking 🚀

6
Comments
3 min read
Beyond the Whack-A-Mole: Securing Your AI Agents with DeepMind's CaMeL Framework

Beyond the Whack-A-Mole: Securing Your AI Agents with DeepMind's CaMeL Framework

5
Comments
7 min read
Claude Opus 4.6: Unpacking Anthropic's Latest AI Safety Breakthroughs

Claude Opus 4.6: Unpacking Anthropic's Latest AI Safety Breakthroughs

1
Comments
8 min read
Moltbook 101: How to Build and Secure Your First AI Agent in the "Agent Social Network"

Moltbook 101: How to Build and Secure Your First AI Agent in the "Agent Social Network"

8
Comments
3 min read
OpenClaw (formerly Moltbook) showed how AI agents can be turned against you

OpenClaw (formerly Moltbook) showed how AI agents can be turned against you

Comments
4 min read
Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)

Why Your Airline’s Chatbot is a Security Risk (and How to Fix It)

5
Comments
3 min read
LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)

LLM Security Alert: 91,000+ Attacks Probing Enterprise AI Endpoints (And How to Stop Them)

5
Comments
5 min read
"Semantic Chaining" Bypasses Multimodal AI Safety Filters

"Semantic Chaining" Bypasses Multimodal AI Safety Filters

10
Comments
4 min read
A Developer's Guide to Token-Based Rate Limiting and Throttling

A Developer's Guide to Token-Based Rate Limiting and Throttling

5
Comments
5 min read
The Echo Chamber Attack: How Multi-Turn Context Poisoning Bypasses LLM Guardrails

The Echo Chamber Attack: How Multi-Turn Context Poisoning Bypasses LLM Guardrails

Comments
4 min read
Stop AI Jailbreaks Before They Start: A Guide to AI Circuit Breakers

Stop AI Jailbreaks Before They Start: A Guide to AI Circuit Breakers

Comments
3 min read
AI-SPM Explained: How to Secure AI Agents

AI-SPM Explained: How to Secure AI Agents

5
Comments
4 min read
BodySnatcher: How a Hardcoded Secret Led to Full ServiceNow Takeover (CVE-2025-12420)

BodySnatcher: How a Hardcoded Secret Led to Full ServiceNow Takeover (CVE-2025-12420)

5
Comments
3 min read
Your AI Agent Has Too Much Power: Understanding and Taming Excessive Agency

Your AI Agent Has Too Much Power: Understanding and Taming Excessive Agency

Comments
5 min read
Why Your LLM Needs Runtime Guardrails: The Developer's Guide to California's 2026 AI Laws

Why Your LLM Needs Runtime Guardrails: The Developer's Guide to California's 2026 AI Laws

5
Comments
4 min read
The Kiro Agentic IDE Vulnerability (CVE-2026-0830)

The Kiro Agentic IDE Vulnerability (CVE-2026-0830)

5
Comments
4 min read
IAM is Broken for AI Agents: Introducing Dynamic RBAC for Agentic Security

IAM is Broken for AI Agents: Introducing Dynamic RBAC for Agentic Security

Comments 1
4 min read
Why Memory Poisoning is the New Frontier in AI Security

Why Memory Poisoning is the New Frontier in AI Security

Comments
3 min read
Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
5 Critical AI Agent Security Threats Developers Need to Know for 2026

5 Critical AI Agent Security Threats Developers Need to Know for 2026

5
Comments 1
4 min read
MCP Security 101: Protecting Your AI Agents from "God-Mode" Risks

MCP Security 101: Protecting Your AI Agents from "God-Mode" Risks

5
Comments 1
5 min read
AI Agent Security vs. Safety: 5 Essential Best Practices for Developers

AI Agent Security vs. Safety: 5 Essential Best Practices for Developers

5
Comments 1
5 min read
Securing LLMs with Secret Knowledge Defenses

Securing LLMs with Secret Knowledge Defenses

5
Comments
4 min read
The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)

The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)

6
Comments
5 min read
Stop the Hijack: A Developer's Guide to AI Agent Security and Tool Guardrails

Stop the Hijack: A Developer's Guide to AI Agent Security and Tool Guardrails

5
Comments 1
5 min read
Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

Indirect Prompt Injection: The Sneaky AI Vulnerability You Need to Know

5
Comments
5 min read
loading...