<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Fleet on investigator&#39;s notes</title>
    <link>https://karmine05.github.io/dirtyfrag-blog/tags/fleet/</link>
    <description>Recent content in Fleet on investigator&#39;s notes</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 13 May 2026 09:00:00 -0400</lastBuildDate>
    <atom:link href="https://karmine05.github.io/dirtyfrag-blog/tags/fleet/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Endpoint Risk and Threat Hunting, in Plain English: A Fleet MCP Manifesto</title>
      <link>https://karmine05.github.io/dirtyfrag-blog/posts/fleet-mcp-manifesto/</link>
      <pubDate>Wed, 13 May 2026 09:00:00 -0400</pubDate>
      <guid>https://karmine05.github.io/dirtyfrag-blog/posts/fleet-mcp-manifesto/</guid>
      <description>Why fleet-mcp exists. A manifesto for natural-language endpoint security: ask a question in English, get a real osquery scan across every host you own, with the SQL shown to you and the assumptions named.</description>
    </item>
    <item>
      <title>Mini Shai-Hulud: Detecting a Live npm Supply Chain Worm with Fleet</title>
      <link>https://karmine05.github.io/dirtyfrag-blog/posts/mini-shai-hulud-tanstack-supply-chain/</link>
      <pubDate>Tue, 12 May 2026 08:00:00 -0400</pubDate>
      <guid>https://karmine05.github.io/dirtyfrag-blog/posts/mini-shai-hulud-tanstack-supply-chain/</guid>
      <description>CVE-2026-45321 is an active npm supply chain worm daemonizing on install and harvesting developer credentials across GitHub Actions, AWS, Vault, and Kubernetes. Full IoC set, Fleet detection tooling, and results from scanning 30 hosts — plus the critical gap in Fleet&amp;#39;s npm table and why the deep scan scripts exist.</description>
    </item>
    <item>
      <title>Pre-CVE Threat Response: A Dirty Frag Walkthrough with Fleet</title>
      <link>https://karmine05.github.io/dirtyfrag-blog/posts/pre-cve-response-with-fleet/</link>
      <pubDate>Fri, 08 May 2026 13:30:00 -0400</pubDate>
      <guid>https://karmine05.github.io/dirtyfrag-blog/posts/pre-cve-response-with-fleet/</guid>
      <description>How to respond to a public Linux exploit before it has a CVE assigned, using artifact-based queries instead of vulnerability catalogs. A worked example with Fleet, osquery, and a Slack bot wired to MCP.</description>
    </item>
  </channel>
</rss>
