about us

Who we are and why we're doing this

keepsecure labs is an application security research lab. We publish vulnerability analyses, tool assessments, and detection research for security and engineering teams that want a practitioner's read on the CVEs that matter.

Our Mission

Close the gap between what's published in a CVE advisory and what a defender can do with it by Monday morning.

Our Role

Independent research for the people who run AppSec programs. No sponsor gates, no paywall on the core analyses. Written by practitioners with a decade on the defender side.

Our Values
  • Deliver results, earn trust
  • Don't assume, make sure
  • Accomplish more with less
  • Always learn, be curious
  • Simplify the complexity

5M+

Findings analyzed

20+

Teams we've worked with

80K+

Scans reviewed per month

700+

Detection rules designed

The team behind keepsecure labs

A small team of application-security engineers who've spent the last decade running AppSec programs at scale. Individual bylines will come as the team gets comfortable being public; in the meantime, our research speaks for itself in the hub.

Questions

Frequently asked

Is keepsecure labs a consultancy?

No. It's an independent research lab. The output is published analyses — not engagements. We occasionally take a small number of paid advisory projects each year when the problem is a good fit; those are not the business model. See Contact for details.

Who writes the research?

A small team of application-security engineers. Current public byline is the GitHub handle falco365. Additional named contributors will appear as team members get comfortable being public.

Is the content free to read? Any paywall?

Yes, free. No paywall on the analyses. No email gate, no account required. The Hub is the primary output and stays open.

Are the detection artifacts open source?

Yes. Detection rules, hunt queries, and reproducer scripts live in the keepsecure-labs/artifacts repo under Apache-2.0. IOCs are facts and not copyrightable. Each post with artifacts links straight to its folder.

How often do you publish?

Weekly. Monday-ish. The Hub is the feed; recent analyses are surfaced on the homepage and in the JSON feed.

Do you cover AI / ML security?

Yes — both offensively (malicious model files, agent hijacking, prompt-injection paths, MLOps tooling abuse) and defensively (agent permissions, prompt-injection guardrails, model-file validation, MLOps access boundaries). See Offensive and Defensive research scope.

Can I cite or quote your posts in other work?

Yes. Attribution appreciated — link to the canonical URL at https://keepsecure.io/hub/<slug>. For LLM ingestion, a structured feed is at /llms.txt and the full text at /llms-full.txt.

Do you do pentests or security audits?

Not as a product. Our research is the public output. We occasionally take advisory work — describe the problem on Contact and we'll tell you honestly whether it fits.