<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>AI Tool Security on SPERIXLABS</title><link>https://sperixlabs.org/series/ai-tool-security/</link><description>Recent content in AI Tool Security on SPERIXLABS</description><generator>Hugo</generator><language>en-us</language><copyright>SPERIXLABS</copyright><lastBuildDate>Sat, 11 Apr 2026 18:10:00 +0000</lastBuildDate><atom:link href="https://sperixlabs.org/series/ai-tool-security/index.xml" rel="self" type="application/rss+xml"/><item><title>What Leaves Your Workstation When You Use an LLM Coding CLI</title><link>https://sperixlabs.org/post/2026/04/what-leaves-your-workstation-when-you-use-an-llm-coding-cli/</link><pubDate>Sat, 11 Apr 2026 18:10:00 +0000</pubDate><guid>https://sperixlabs.org/post/2026/04/what-leaves-your-workstation-when-you-use-an-llm-coding-cli/</guid><description>&lt;h2 id="tldr"&gt;TL;DR&lt;a class="anchor" href="#tldr" aria-label="Anchor to this section"&gt;#&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;I put five LLM coding CLIs through a transparent TLS-intercepting proxy for about three and a half hours in a lab environment and captured every HTTP(S) transaction they made. The tools were &lt;strong&gt;Claude Code&lt;/strong&gt;, &lt;strong&gt;GitHub Copilot CLI&lt;/strong&gt;, &lt;strong&gt;Cursor CLI&lt;/strong&gt;, &lt;strong&gt;OpenAI Codex CLI&lt;/strong&gt;, and &lt;strong&gt;Opencode CLI&lt;/strong&gt;. The capture ran on an Apple Silicon MacBook (darwin/arm64) on 2026-04-11 and produced 302 transactions across 18 hosts.&lt;/p&gt;
&lt;p&gt;A few things stood out:&lt;/p&gt;</description></item><item><title>Ollama-Forge for Security Research: Local Models, Refusal Ablation, and Reproducible Pipelines</title><link>https://sperixlabs.org/post/2026/02/ollama-forge-for-security-research-local-models-refusal-ablation-and-reproducible-pipelines/</link><pubDate>Mon, 16 Feb 2026 12:00:00 +0000</pubDate><guid>https://sperixlabs.org/post/2026/02/ollama-forge-for-security-research-local-models-refusal-ablation-and-reproducible-pipelines/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;a class="anchor" href="#introduction" aria-label="Anchor to this section"&gt;#&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;Security work often involves prompts and data you cannot send to commercial APIs: malware descriptions, exploit drafts, jailbreak and prompt-injection tests, or sensitive internal docs. Running models locally gives you control and keeps that data on your machine. &lt;a href="https://pypi.org/project/ollama-forge/"&gt;&lt;strong&gt;ollama-forge&lt;/strong&gt;&lt;/a&gt; is a CLI (&lt;a href="https://pypi.org/project/ollama-forge/"&gt;PyPI&lt;/a&gt; · &lt;a href="https://github.com/jayluxferro/ollama-forge"&gt;GitHub&lt;/a&gt;) that makes it straightforward to fetch open-weight models, convert them to &lt;a href="https://ollama.com"&gt;Ollama&lt;/a&gt;, remove refusal behavior when you need it for defensive or red-team research, run security evals (e.g. ASR, refusal rate) against your local model, and lock down exact setups for reproducibility.&lt;/p&gt;</description></item></channel></rss>