Preparing for Hacker Summer Camp and a new cloud image investigator

Welcome to the July 2025 edition of the Datadog Security Digest!


This month’s digest covers Hacker Summer Camp prep, a new cloud image investigator, and supply-chain vulnerabilities associated with the Open VSX Registry.


This newsletter was created by a real person, not a machine. Your curator of the month is Kennedy Toomey.

Hacker Summer Camp is quickly approaching

Check out our 2025 guide to Hacker Summer Camp to hear all about where we’ll be, as well as tips and tricks for the week. We’ve also compiled a list highlighting 50 talks we’re especially excited about across all areas of security. Our security researchers will be well represented at the various conferences, including six speaking sessions:

Cloud security

New tool investigator.cloud in preview

In conjunction with Seth Art’s research shared at fwd:cloudsec North America, we released a public preview of a new investigator.cloud tool to search and explore public cloud images, their lineage, and their file systems.

Entra ID behavior leads to privilege escalation vulnerability

Katie Knowles, one of our security researchers, details a vulnerability in Microsoft's Entra ID. Katie explains how service principals (SPs) can be used for persistence and privilege escalation by attackers that have access to an SP that is assigned an elevated role. If you missed Katie’s fwd:cloudsec North America talk, this post offers an excellent opportunity to learn about the research she presented.

Container security

New Python tool helps analyze Kubernetes clusters post-compromise

KubeForenSys is a new Python tool designed to automatically gather data from Kubernetes clusters and send the information to an Azure Log Analytics workspace. This tool was built to help with the analysis of Azure Kubernetes Service (AKS) clusters post-compromise.

NVIDIAScape: A new critical container escape vulnerability

According to Wiz researchers, over one-third of cloud environments are vulnerable to a new critical vulnerability in the NVIDIA Container Toolkit (NCT). The vulnerability allows malicious containers to gain full root access to the host machine.

AI and LLM security

How to reduce risk when developing with MCPs

Model Context Protocol (MCP) has many benefits that developers are eager to take advantage of, but it can introduce security concerns. This post explains threats that come with using MCP, along with ways to mitigate them.

A critical remote code execution (RCE) vulnerability has been discovered in the mcp-remote project. The vulnerability allows arbitrary OS command execution on machines that run mcp-remote when mcp-remote initiates a connection to an untrusted MCP server. This post highlights the severe risks of connecting to malicious or insecure MCP servers.

Benchmark for LLM coding accuracy and security

BaxBench is a new coding benchmark that assesses how well large language models (LLMs) can produce accurate and secure code. It includes a leaderboard to show the percentage of code that each model writes that is correct and secure.

Supply-chain security

Misused privileged credentials lead to critical vulnerability

A new critical vulnerability in the Open VSX Registry stemmed from a CI issue in which a secret token was exposed to both trusted and untrusted code. This vulnerability enabled attackers to publish or overwrite any extension, posing a significant supply-chain risk.

Ranking algorithm increases use of malicious packages

A malicious open source package that was disguised as a Solidity Language extension in the Open VSX Registry led to a crypto heist by compromising a blockchain developer's system. This attack was aided by the registry ranking algorithm, which has become an added factor in supply-chain attacks.

Threat detection and incident response

Arbitrary file write vulnerability found in Git

Datadog’s security researchers investigated CVE-2025-48384, a newly released high vulnerability present in many versions of the Git CLI and desktop client on non-Windows machines. This vulnerability allows arbitrary file write when you use the `--recursive` flag to clone untrusted repositories with submodules. Patches have been released to fix the vulnerability.

Malicious Homebrew installation campaign

A Google ad for Homebrew installation via GitHub led to a malicious version being installed. This post does a deep dive into the investigation of this malware campaign.

Community events and talks

Video recordings for fwd:cloudsec North America are available

The fwd:cloudsec North America conference took place in Denver, Colorado, on June 30–July 1. If you missed it, check out these talks from our security researchers:

Announcing the Datadog expansion pack of Backdoors & Breaches

Last month at DASH, we released a new Datadog expansion pack of Backdoors & Breaches, an incident response card game. If you’re interested, take a look at the gameplay guide or watch the announcement video.