logo
|
Blog
  • Vulnerability Research
  • AI for Security
  • Security for AI
  • Web2
  • 🌐

Theori BLOG

Empowering Innovation with Security
Explore expert insights into offensive security and threat intelligence.
See AllAI for SecuritySecurity for AIVulnerability ResearchWeb2 SecurityAIxCC
The Frontier Isn’t the Model: Why ‘Good Enough’ Reasoning + Scaffolding Is More Important

The Frontier Isn’t the Model: Why ‘Good Enough’ Reasoning + Scaffolding Is More Important

In this exclusive report, Xint researchers compare Mythos's publicly disclosed results versus what broadly available models can accomplish using advanced scaffolding
Hector Leano's avatar
Apr 16, 2026
AI for Security
Finding and Patching a CPython 0day in Hours: CVE-2026-6100

Finding and Patching a CPython 0day in Hours: CVE-2026-6100

A critical CPython CVE today took less than 45 minutes of human work to find, triage, and fix because of Xint Code
Hector Leano's avatar
Xint's avatar
Apr 13, 2026
AI for Security
AI Made Code Cheap. Trust Did Not.

AI Made Code Cheap. Trust Did Not.

While code is abundant, assurance is scarce. The winners won't be the teams that generate the most code, it’ll be the teams that can prove it's safe.
Hector Leano's avatar
Xint's avatar
Apr 13, 2026
AI for Security
How Xint’s Predictable Pricing Solves the Token Burn Problem for AI in AppSec

How Xint’s Predictable Pricing Solves the Token Burn Problem for AI in AppSec

Linear increases in code are leading to exponential token burn increases. Xint's orchestration brings clear, predictable pricing.
Hector Leano's avatar
Apr 09, 2026
AI for Security
What are business logic vulnerabilities, and why are they so hard to catch?

What are business logic vulnerabilities, and why are they so hard to catch?

Even secure-looking code can hide dangerous flaws. Learn why business logic vulnerabilities are hard to detect and why most scanners miss them.
Xint's avatar
Mar 06, 2026
AI for Security
The Frontier Isn’t the Model: Why ‘Good Enough’ Reasoning + Scaffolding Is More Important

The Frontier Isn’t the Model: Why ‘Good Enough’ Reasoning + Scaffolding Is More Important

In this exclusive report, Xint researchers compare Mythos's publicly disclosed results versus what broadly available models can accomplish using advanced scaffolding
Hector Leano's avatar
Apr 16, 2026
AI for Security
Finding and Patching a CPython 0day in Hours: CVE-2026-6100

Finding and Patching a CPython 0day in Hours: CVE-2026-6100

A critical CPython CVE today took less than 45 minutes of human work to find, triage, and fix because of Xint Code
Hector Leano's avatar
Xint's avatar
Apr 13, 2026
AI for Security
AI Made Code Cheap. Trust Did Not.

AI Made Code Cheap. Trust Did Not.

While code is abundant, assurance is scarce. The winners won't be the teams that generate the most code, it’ll be the teams that can prove it's safe.
Hector Leano's avatar
Xint's avatar
Apr 13, 2026
AI for Security
How Xint’s Predictable Pricing Solves the Token Burn Problem for AI in AppSec

How Xint’s Predictable Pricing Solves the Token Burn Problem for AI in AppSec

Linear increases in code are leading to exponential token burn increases. Xint's orchestration brings clear, predictable pricing.
Hector Leano's avatar
Apr 09, 2026
AI for Security
What are business logic vulnerabilities, and why are they so hard to catch?

What are business logic vulnerabilities, and why are they so hard to catch?

Even secure-looking code can hide dangerous flaws. Learn why business logic vulnerabilities are hard to detect and why most scanners miss them.
Xint's avatar
Mar 06, 2026
AI for Security
Announcing Xint Code

Announcing Xint Code

Real Vulnerabilities. Actionable Results.
Xint's avatar
Dec 16, 2025
AI for Security
Building Effective LLM Agents | AI Cyber Challenge

Building Effective LLM Agents | AI Cyber Challenge

How we learned to build effective LLM agents for hacking at DARPA's AI Cyber Challenge (AIxCC)
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
AI Cyber Challenge and Theori's RoboDuck

AI Cyber Challenge and Theori's RoboDuck

An introduction to DARPA's AI Cyber Challnge and Theori's third place cyber reasoning system
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge

Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge

Agent trajectory walkthroughs of a fully autonomous hacking system
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
Importance of Continuous Security: Lessons from the Bybit Case

Importance of Continuous Security: Lessons from the Bybit Case

In this article, we briefly look at the circumstances of the Bybit incident and discuss what countermeasures could have been implemented. Then, we discuss the limitations of current solutions and how Xint resolves them.
Xint's avatar
Mar 27, 2025
AI for Security
The True Cost of Siloed Security Tools

The True Cost of Siloed Security Tools

Security silos occur when different security tools, teams, or systems operate in isolation, unable to effectively share data or communicate.
Xint's avatar
Dec 20, 2024
AI for Security
Top 5 Features Your ASM Solution Must Have

Top 5 Features Your ASM Solution Must Have

So you know what ASM is and why you need it — but which features are crucial? Here’s the run down.
Xint's avatar
Oct 24, 2024
AI for Security
Offensive Security with Large Language Models (2)

Offensive Security with Large Language Models (2)

How LLMs are changing the game for static analysis — especially when source code is available.
Xint's avatar
Sep 30, 2024
AI for Security
Offensive Security with Large Language Models (1)

Offensive Security with Large Language Models (1)

Applications of larage language models in offensive security
Xint's avatar
Sep 27, 2024
AI for Security
Winning the AIxCC Qualification Round

Winning the AIxCC Qualification Round

Theori’s Cyber Reasoning System (CRS) “Robo Duck” not only cleared the bar to get us $2M and a spot at the AIxCC finals in 2025, it also got the first place among all the submissions in the highly competitive event.
Xint's avatar
Sep 23, 2024
AI for Security
Top Penetration Testing Solutions for IT Security: 2024 Guide

Top Penetration Testing Solutions for IT Security: 2024 Guide

The top 7penetration testing tools of 2024 for hackers and for businesses.
Xint's avatar
Sep 11, 2024
AI for Security

Theori © 2025 All rights reserved.

RSS·Powered by Inblog