§ — · The Lupid Brief · Engineering, Research, Field Notes

Notes from the runtime.

Engineering notes, research briefs, and field reports from the team building Lupid. We write when we have something we'd want to read ourselves — rarely, slowly, with the work in front of us.

Ledger · 7 entries on file Most recent first
Featured · Security Research · 03 May 2026 · 11 min read

When the browser is the agent.

OpenAI shipped ChatGPT Atlas and admitted prompt injection may never be fully ‘solved’ for browser agents. A reading of why that admission is the thesis statement for runtime enforcement.

In October 2025, OpenAI shipped Atlas — a browser where the agent is the user. Two months later, they wrote that prompt injection is unlikely to ever be fully solved for this class of product. They shipped the product first. They published the admission second. A reading of what changes when every webpage is an attack surface and where an enforcement layer outside the browser actually catches.

Read the brief
Date Title · Excerpt Read time
02 May 2026

The attack that waits.

Memory poisoning lets an attacker plant a payload in February that fires in April. A reading of MINJA-shaped attacks and what re-classifying memory at retrieval time catches that classifying it at write time does not.

Security Research
9 min read
30 April 2026

When the IDE writes its own permissions.

A reading of CVE-2025-54135 (CurXecute), and why a permission list inside the agent's writable filesystem is a permission list with one footnote: or whoever else can write here.

Security Research
11 min read
28 April 2026

EchoLeak and the zero-click agent.

CVE-2025-32711 was the first known attack on an AI agent that needed no user action at all. The agent's retrieval layer was the vector. A reading of what changes when the prompt-injection surface is the corpus, not the prompt.

Security Research
9 min read
26 April 2026

Trust Issues was a privilege bug, not a prompt bug.

How a governance plane in the agent's path turns the lethal trifecta from inevitable into observable. A step-by-step reading of the gemini-cli supply-chain disclosure.

Security Research
13 min read
19 April 2026

Reading a post-mortem.

A walkthrough of an autonomous agent incident, the runtime that caught it, and what the record looks like twenty-four hours later.

Field Engineering
9 min read
04 April 2026

On the runtime as ledger.

Why the audit log is not an artifact of security work. It is the work. A short essay on what changes when the record becomes the product.

Manifesto
5 min read