Hi there! I’m a Senior AI Security Researcher on the Red Team at Zenity and a PhD student at the Technion, Israel Institute of Technology.
I break AI agents for a living, and then figure out how to fix them. At Zenity, I research AI security vulnerabilities across agentic AI systems, LLM-powered applications, and enterprise AI platforms. I discover new attack vectors, develop remediation strategies, and work to drive the industry toward stronger security practices. I’m also passionate about teaching others and spreading awareness, serving as a thought leader in the AI security space through conference talks, blog posts, and community engagement.
My offensive security work spans attacks on RAG pipelines, multi-agent delegation protocols, agentic browsers, and production-scale GenAI systems. I introduced the concept of Promptware: a new class of inference-time threats that exploit GenAI models through malicious prompts, turning them from helpful assistants into tools for data exfiltration, lateral movement, and even physical-world consequences. I share these findings at leading security venues including Black Hat USA, Black Hat Europe, DEF CON, and SecTor.
My PhD research focuses on the secure integration of Generative AI into real-world infrastructure, especially Cyber-Physical-Human Systems (CPHS) involving human-in-the-loop interactions, such as smart water networks and GenAI-powered virtual assistants. I explore how GenAI agents can be safely and effectively integrated into these environments to support real-time decision-making, anomaly detection, and human-machine collaboration.
Excellent Instructor Award recipient (2024, 2025). Teaching Assistant in the courses:
* Machine Learning in Portfolio Selection
* Big Data Gathering and Management Lab
* Software Engineering 2 - MLOPs
* Cognition in Information Visualization
We demonstrate how indirect prompt injection can turn OpenClaw — the popular open-source autonomous agent — into a persistent backdoor. Through a zero-click attack, we establish an external control channel, achieve durable persistence via SOUL.md manipulation, and escalate to full host compromise by deploying a C2 implant.
Website BlackHat USA 2025 DEFCON 2025 SecTor 2025 Google Security Blog
BlackHat24 Talk Youtube ArXiv Website Forbes Article Video GitHub